SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
SecurityOverview,[object Object],BunkerMail encryption,[object Object],and key exchange,[object Object],October 7, 2010	GlobalCrypto.com,[object Object]
Todd Merrill, CEO GlobalCrypto	,[object Object],@ToddMerrill,[object Object],info@globalcrypto.com,[object Object]
Challenges with PCI-DSS ,[object Object],Requirement 3: (Encrypt at Rest),[object Object],“Protect stored cardholder data”,[object Object],Crypto-key distribution,[object Object],Requirement 4: (Encrypt in Motion),[object Object],“Encrypt transmission of cardholder data across open, public networks”,[object Object],Requirement 8: (Strong Authentication),[object Object],“Assign a unique ID to each person with computer access”,[object Object]
Bunker mail security
We distribute Crypto keys to web users,[object Object],We hide crypto in digital pictures  Steganography!,[object Object],User credential contains (AES encrypted):,[object Object],RSA-1024 user key pair (public-private),[object Object],RSA-2048 public key for BunkerMail application,[object Object],Dual digital signatures for Authentication,[object Object]
Authentication,[object Object],Strong, Multi-Factor Authentication ,[object Object],Picture = Virtual Smartcard,[object Object],Password is never transmitted or stored,[object Object],Bi-directional Authentication ,[object Object],Sessions are encrypted using unique AES key exchanged upon Authentication (via our PKI),[object Object],HTTPS used in addition, (redundant),[object Object],globalcrypto.com/knowledge-center-overview,[object Object]
Authentication,[object Object]
Encryption—end-to-end,[object Object],Private Note and Attachments are encrypted with unique AES keys.,[object Object],AES keys are encrypted with BunkerMail public key (RSA-2048).,[object Object],BunkerMail decrypts the AES keys and re-encrypts them with the public key(s) of recipients,[object Object],AES keys are escrowed if a user is not in the system (no public key yet),[object Object]
Bunker mail security
Ideal technical solution,[object Object],Encrypts at rest ,[object Object],Encrypts in motion, end-to-end,[object Object],Provides audit logging, robust audit trail,[object Object],Housed in a secure data center,[object Object],Provides encrypted, automated archival,[object Object],Enforces strong, unique access controls,[object Object],Simple to use,[object Object]

Contenu connexe

Tendances

EthCC 2018 - Decentralized Digital Identity on Ethereum
EthCC 2018 - Decentralized Digital Identity on EthereumEthCC 2018 - Decentralized Digital Identity on Ethereum
EthCC 2018 - Decentralized Digital Identity on EthereumFabrice Croiseaux
 
Introduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloIntroduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloSSIMeetup
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain TechnologyNasir Bhutta
 
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...SSIMeetup
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanSSIMeetup
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Worksray0510711s
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
 
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSSupply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSStylight
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?Evernym
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
 
Is your distributed system secure?
Is your distributed system secure?Is your distributed system secure?
Is your distributed system secure?Lacey Trebaol
 
Blockchain - Navigating this Game-Changing Technology
Blockchain - Navigating this Game-Changing TechnologyBlockchain - Navigating this Game-Changing Technology
Blockchain - Navigating this Game-Changing TechnologyConor Svensson
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...SSIMeetup
 
Saa s force_presentatie_2013_nomadesk
Saa s force_presentatie_2013_nomadeskSaa s force_presentatie_2013_nomadesk
Saa s force_presentatie_2013_nomadeskNico Bosschaert
 

Tendances (20)

EthCC 2018 - Decentralized Digital Identity on Ethereum
EthCC 2018 - Decentralized Digital Identity on EthereumEthCC 2018 - Decentralized Digital Identity on Ethereum
EthCC 2018 - Decentralized Digital Identity on Ethereum
 
Introduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloIntroduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus Sabadello
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain Technology
 
ViaSip beta
ViaSip betaViaSip beta
ViaSip beta
 
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
 
Week11
Week11Week11
Week11
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSSupply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
Is your distributed system secure?
Is your distributed system secure?Is your distributed system secure?
Is your distributed system secure?
 
Blockchain - Navigating this Game-Changing Technology
Blockchain - Navigating this Game-Changing TechnologyBlockchain - Navigating this Game-Changing Technology
Blockchain - Navigating this Game-Changing Technology
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 
Saa s force_presentatie_2013_nomadesk
Saa s force_presentatie_2013_nomadeskSaa s force_presentatie_2013_nomadesk
Saa s force_presentatie_2013_nomadesk
 

En vedette

Tax resources 2014 update
Tax resources  2014 updateTax resources  2014 update
Tax resources 2014 updateKatie Brown
 
Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...
Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...
Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...Universidad Internacional Valenciana (VIU)
 
Las emociones karla y cristina
Las emociones karla y cristinaLas emociones karla y cristina
Las emociones karla y cristinatallerempleomf
 
Caso de éxito, Bioconservación Dynamics CRM Online
Caso de éxito, Bioconservación Dynamics CRM OnlineCaso de éxito, Bioconservación Dynamics CRM Online
Caso de éxito, Bioconservación Dynamics CRM OnlineAmauta Cloud Consulting
 
Presentation of various B2B Business models case study
Presentation of various B2B Business models case studyPresentation of various B2B Business models case study
Presentation of various B2B Business models case studyPhilippe Deschenes
 
Datasheet EnGenius EZ Hotspot Extender
Datasheet EnGenius EZ Hotspot ExtenderDatasheet EnGenius EZ Hotspot Extender
Datasheet EnGenius EZ Hotspot ExtenderEnGenius Europe
 
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIAS
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIASCALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIAS
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIASMD Asesores Valladolid
 
Buoni+ Giugno 2015 GameStop Italia
Buoni+ Giugno 2015 GameStop ItaliaBuoni+ Giugno 2015 GameStop Italia
Buoni+ Giugno 2015 GameStop ItaliaGameStop Italia
 
Guia CH3
Guia CH3Guia CH3
Guia CH3chtres
 

En vedette (20)

Notichanel Jun - Jul
Notichanel Jun - JulNotichanel Jun - Jul
Notichanel Jun - Jul
 
CEMflex VB engl.
CEMflex VB engl.CEMflex VB engl.
CEMflex VB engl.
 
Tax resources 2014 update
Tax resources  2014 updateTax resources  2014 update
Tax resources 2014 update
 
Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...
Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...
Alumnos destacan de la VIU la gran ventaja que ofrece de conjugar estudios y ...
 
Article Calzado Barato (13)
Article   Calzado Barato (13)Article   Calzado Barato (13)
Article Calzado Barato (13)
 
Las emociones karla y cristina
Las emociones karla y cristinaLas emociones karla y cristina
Las emociones karla y cristina
 
Caso de éxito, Bioconservación Dynamics CRM Online
Caso de éxito, Bioconservación Dynamics CRM OnlineCaso de éxito, Bioconservación Dynamics CRM Online
Caso de éxito, Bioconservación Dynamics CRM Online
 
Presentation of various B2B Business models case study
Presentation of various B2B Business models case studyPresentation of various B2B Business models case study
Presentation of various B2B Business models case study
 
Datasheet EnGenius EZ Hotspot Extender
Datasheet EnGenius EZ Hotspot ExtenderDatasheet EnGenius EZ Hotspot Extender
Datasheet EnGenius EZ Hotspot Extender
 
Aves magacinedicion8
Aves magacinedicion8Aves magacinedicion8
Aves magacinedicion8
 
Etapasdelavida
EtapasdelavidaEtapasdelavida
Etapasdelavida
 
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIAS
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIASCALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIAS
CALENDARIO LABORAL 2012 MD ASESORES VALLADOLID GESTORES ASESORIAS GESTORIAS
 
Pkv
PkvPkv
Pkv
 
Buoni+ Giugno 2015 GameStop Italia
Buoni+ Giugno 2015 GameStop ItaliaBuoni+ Giugno 2015 GameStop Italia
Buoni+ Giugno 2015 GameStop Italia
 
Guia CH3
Guia CH3Guia CH3
Guia CH3
 
Life Resoance Cosmetics Insert E
Life Resoance Cosmetics  Insert ELife Resoance Cosmetics  Insert E
Life Resoance Cosmetics Insert E
 
Catalog panasonic 824
Catalog panasonic 824Catalog panasonic 824
Catalog panasonic 824
 
ICI FINAL REPORT
ICI FINAL REPORTICI FINAL REPORT
ICI FINAL REPORT
 
Nutrición deportiva 2 0 juny_xir
Nutrición deportiva 2 0 juny_xirNutrición deportiva 2 0 juny_xir
Nutrición deportiva 2 0 juny_xir
 
Gualano hnos
Gualano hnosGualano hnos
Gualano hnos
 

Similaire à Bunker mail security

cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20eyad alaa
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonUlf Mattsson
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
Biometric electronic wallet for digital currency
Biometric electronic wallet for digital currencyBiometric electronic wallet for digital currency
Biometric electronic wallet for digital currencyeSAT Publishing House
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)Maarten Mulders
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Ioannis Krontiris
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Mukesh Chinta
 
A Study For Public Key Digital Signature Schemes
A Study For Public Key Digital Signature SchemesA Study For Public Key Digital Signature Schemes
A Study For Public Key Digital Signature SchemesMelissa Long
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSylvain Maret
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkErni Susanti
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsUlf Mattsson
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymousnexgentech15
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 

Similaire à Bunker mail security (20)

cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Biometric electronic wallet for digital currency
Biometric electronic wallet for digital currencyBiometric electronic wallet for digital currency
Biometric electronic wallet for digital currency
 
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
A Study For Public Key Digital Signature Schemes
A Study For Public Key Digital Signature SchemesA Study For Public Key Digital Signature Schemes
A Study For Public Key Digital Signature Schemes
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 

Plus de Todd Merrill

Predictive Analytics from Emotional Analysis
Predictive Analytics from Emotional Analysis Predictive Analytics from Emotional Analysis
Predictive Analytics from Emotional Analysis Todd Merrill
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explainedTodd Merrill
 
Bunker mail group features
Bunker mail group featuresBunker mail group features
Bunker mail group featuresTodd Merrill
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceTodd Merrill
 
Astronomy Belt Loop
Astronomy Belt LoopAstronomy Belt Loop
Astronomy Belt LoopTodd Merrill
 
Hipaa Secure File Transfer
Hipaa Secure File TransferHipaa Secure File Transfer
Hipaa Secure File TransferTodd Merrill
 
GlobalCrypto's Real Me Authentication
GlobalCrypto's Real Me AuthenticationGlobalCrypto's Real Me Authentication
GlobalCrypto's Real Me AuthenticationTodd Merrill
 

Plus de Todd Merrill (7)

Predictive Analytics from Emotional Analysis
Predictive Analytics from Emotional Analysis Predictive Analytics from Emotional Analysis
Predictive Analytics from Emotional Analysis
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
 
Bunker mail group features
Bunker mail group featuresBunker mail group features
Bunker mail group features
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA compliance
 
Astronomy Belt Loop
Astronomy Belt LoopAstronomy Belt Loop
Astronomy Belt Loop
 
Hipaa Secure File Transfer
Hipaa Secure File TransferHipaa Secure File Transfer
Hipaa Secure File Transfer
 
GlobalCrypto's Real Me Authentication
GlobalCrypto's Real Me AuthenticationGlobalCrypto's Real Me Authentication
GlobalCrypto's Real Me Authentication
 

Dernier

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 

Dernier (20)

20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 

Bunker mail security

  • 1.
  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8.
  • 10.

Notes de l'éditeur

  1. PCI-DSS places many requirements on companies that handle Payment Card Information.BunkerMail addresses three main requirements with one technical solution for sending messages and files across company boundaries.Requirement 3 deals with Encryption at Rest. When you email or FTP a file to a business partner the file may be encrypted by HTTPS or SSL during transmission, but when the file is uploaded to a server often it is stored in an unencrypted state. End-to-End Encryption is an answer for this problem, but you have to distribute cryptographic keys to each user. BunkerMail makes this simple.Requirement 4 deals with Encryption in Motion. Most secure applications use HTTPS or SSL encrypted email sessions and cover encryption in motion. BunkerMail takes this a step further and authenticates the channel to thwart phishing and man-in-the-middle attacks.Requirement 8 deals with Strong Authentication. Users should be uniquely credentialed and multi-factor authentication should be used where possible. BunkerMail employs a strong, bi-directional multi-factor authentication that is simple to use.
  2. GlobalCrypto recognizes that cryptographic key distribution is a hard. Certificates and key files are alien to end users and complex to set up.BunkerMail distributes crypto keys to end users by hiding them inside of digital images. Web technologies such as .NET and Flash are used to seamlessly store these images on the end user’s machine. End users hold these credentials on their computers which contain:-An RSA-1024 bit key pair (public and private keys) for the end user.-An RSA-2048 bit public key for the BunkerMail web application.-Partial digital signatures for the user and the web application for Authentication purposes.All of this cryptographic materiel is stored encrypted with AES where the key is a password. Note that the password is never transmitted or stored.
  3. BunkerMail’s image-key is essentially a Virtual Smartcard with a password.The web application stores the image on the user’s machine for later use and recalls the image for authentication.Users only have to type in their password on an enrolled machine.The password is used to decrypt the partial digital signatures as well as the cryptographic keys.Authentication takes place over a secure channel via a session AES key that is exchanged using BunkerMail’s keys. This thwarts phishing and man-in-the-middle attacks that may plague HTTPS. HTTPS is used as a redundant protocol, but is not necessary.See our knowledge center at www.globalcrypto.com for a more in depth study of our authentication.
  4. Here is what the user sees at authentication time. The web server retains a copy of the right-hand side of the image with partial digital signatures.When the user enters a password, the left-hand side is unlocked and transmitted to the server over a secure channel. If authenticated, the web server sends down an unlocked right-hand side of the image and the user is authenticated.The user sees both sides of the image come together and is logged in.
  5. All information is sent as XML through previously authenticated and encrypted sessions. Encryption in motion is always maintained.However, some information is encrypted end-to-end:--The Private note is a message field for Rich Text and is encrypted end-to-end.--Any attachments are end-to-end encrypted.Each attachment and the private note are encrypted with a unique AES key.The AES keys are transmitted to the BunkerMail server using the Server’s public key. BunkerMail re-encrypts the AES keys using the recipient’s public keys.BunkerMail will escrow any AES keys that are bound for users who have not previously established an account and therefore don’t have a public key yet. Upon registration, the AES keys are re-encrypted using the new user’s public key.
  6. We have a great technical solution to solve file transfer and sending of messages in a PCI regulated environment.We have solid cryptographic security and provide a simple user experience.Try us out at www.bunkermail.com