SlideShare une entreprise Scribd logo
1  sur  49
Secure Email Messaging
Secure Email Messaging Webinar Meeting legal & regulatory compliance while improving communication with your customers and business partners Brent Faulk NeoCertified – Today’s Host (877) 613-5036 [email_address]
About NeoCertified ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ We believe that security is more of a process than a product” - Peter Schaub (NeoForte President)
Why should secure email be considered Gramm-Leach-Bliley Act  (GLBA), 15 USC, Subchapter I, Sec. 6801-6809, Disclosure of Nonpublic Personal Information Transmission and Storage of personal information Requires compliance  with SEC and FINRA rules (reference 501b) Sarbanes-Oxley Act  of 2002 (Pub. L. No. 107-204, 116 Stat. 745,  also known as SOX or Sarbox  Section 404 regulates enforcement of internal controls including an annual assessment of the internal control structure’s effectiveness Requires prevention of “unauthorized use” of financial information, inc. information in transit Protect your customers YOUR CAMELS RATING?
How are you sending information now? ,[object Object],[object Object],[object Object],[object Object],What is your current cost to manually send information?
Why it should be a commercially viable & simple solution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Auditors are asking, “What are you doing for secure email encryption?”  “Where does that data reside?”
What’s Your Email Exposure? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Originator Creates a message Multiple copies of e-mail on non-secure Internet Servers The RISK of “Traditional Email” Traditional Email can be captured, changed, and used COMPANY LAN ORIGINATOR Company Normal Email Web Server RECIPIENT Individual ISP
 
 
Do breaches  really  happen?  …all the time Fines are Severe $50,000 to $500,000 per incident
2009 Security Breaches of  Banking, Credit, & Financial
What could happen… LIVE AT THIS LINK:  http://wichita.bizjournals.com/wichita/stories/2010/02/01/daily12.html
Ways to send secure Email with NeoCertified From Any  Internet Browser On Any  Version of Outlook AND
Accessing your secure email from the Internet
Your Secure Message Center
Create a Secure Email
Adding Secure Attachments Up to 30MB
You decide how it’s  sent , and how it’s  received under the body of an email
“ Send Secure”
Verified and Tracked
Receiving a Secure Email
The Recipient’s Experience
Recipient Accesses NeoCertified
Recipient accessing their message Co-Branded
Seeing & handling their email Co-Branded
Download the Button  Makes the Process is a single click
Sending Secure Email via Outlook
Recipient’s Experience
Linking into their message
Recipient Logs on with their own password
Web Access Co-Branded
Read their email, attachments, respond Recipient replies securely  no download or purchase needed
Sender receives delivery confirmation
It’s YOUR IT Policy - Setting Account Preferences IT Policy Enforced with every email
Reports
Reports
Looking at an actual report
Looking at an actual report
1 Gold User  ($219 each) 8 Full Users ($139.50 each) 6 Lite Users ($69.75 each) $1753 Typical 15 User Configuration
Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What you get
What you won’t get…
Summary ,[object Object],[object Object],[object Object],[object Object]
Create a NeoCertified Message Originator clicks  Send NeoCertified  button  Message is encrypted at the desktop computer and message is sent to NeoCertified Server SMTP COMPANY LAN ORIGINATOR Internet Company Normal Email Web Server SECURE eMail ASP RECIPIENT Individual ISP
Server Creates a  “You have a secure e-mail ” message through traditional e-mail NeoCertified Recipient is Notified COMPANY LAN ORIGINATOR Internet Company Normal Email Web Server SECURE eMail ASP RECIPIENT Individual ISP
User Authenticates to View Message SSL User clicks on message link and creates an SSL connection to the NeoCertified Server Recipient Views Message COMPANY LAN ORIGINATOR Internet Company Normal Email Web Server SECURE eMail ASP RECIPIENT Individual ISP
Server Creates a “Recipient has read” message through traditional e-mail Recipient Receipt Returned COMPANY LAN ORIGINATOR Internet Company Normal Email Web Server SECURE eMail ASP RECIPIENT Individual ISP
 

Contenu connexe

En vedette

Https presentation
Https presentationHttps presentation
Https presentationpatel jatin
 
HTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User GroupHTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User GroupJason Stangroome
 
It Services Secure Email Presentation
It Services Secure Email PresentationIt Services Secure Email Presentation
It Services Secure Email Presentationbryanpsu
 
Seminar presentation on embedded web technology
Seminar presentation on embedded web technologySeminar presentation on embedded web technology
Seminar presentation on embedded web technologyRanol R C
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1nhepner
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web TechnologyAashish Jain
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...rahul kundu
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web TechnologyRob Bertholf
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerPina Parmar
 
Introduction to HTTP protocol
Introduction to HTTP protocolIntroduction to HTTP protocol
Introduction to HTTP protocolAviran Mordo
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
 

En vedette (20)

Https presentation
Https presentationHttps presentation
Https presentation
 
HTTPS
HTTPSHTTPS
HTTPS
 
HTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User GroupHTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User Group
 
Https
HttpsHttps
Https
 
7 Protocols
7 Protocols7 Protocols
7 Protocols
 
It Services Secure Email Presentation
It Services Secure Email PresentationIt Services Secure Email Presentation
It Services Secure Email Presentation
 
Https
HttpsHttps
Https
 
Shttp
ShttpShttp
Shttp
 
HTTP
HTTPHTTP
HTTP
 
Seminar presentation on embedded web technology
Seminar presentation on embedded web technologySeminar presentation on embedded web technology
Seminar presentation on embedded web technology
 
Https
HttpsHttps
Https
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web Technology
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web Technology
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
Introduction to HTTP protocol
Introduction to HTTP protocolIntroduction to HTTP protocol
Introduction to HTTP protocol
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 

Similaire à Secure Email Overview - NeoCertified Demo

Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Video In Email Presentation
Video In Email PresentationVideo In Email Presentation
Video In Email PresentationGoodmail Systems
 
ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration
ILTA Conference 2011 - Biscom Secure File Transfer Technology DemonstrationILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration
ILTA Conference 2011 - Biscom Secure File Transfer Technology DemonstrationBiscom Delivery Server
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365NovaQuantum
 
How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely SreeramulaSatya
 
Email Management and Email Archiving
Email Management and Email ArchivingEmail Management and Email Archiving
Email Management and Email Archivingcrussell79
 
Cloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsCloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsStrategic Insurance Software
 
Biscom Delivery Server Sales Presentation
Biscom Delivery Server Sales PresentationBiscom Delivery Server Sales Presentation
Biscom Delivery Server Sales PresentationJoseph Mark Heinzen
 
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...Mithi SkyConnect
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird iiBanukaVidusanka
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecuritySymantec
 
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations ZixMailEncryption.com
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security IncidentsEchoworx
 

Similaire à Secure Email Overview - NeoCertified Demo (20)

Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Video In Email Presentation
Video In Email PresentationVideo In Email Presentation
Video In Email Presentation
 
ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration
ILTA Conference 2011 - Biscom Secure File Transfer Technology DemonstrationILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration
ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365
 
How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely
 
Lotusphere 2011 SHOW104
Lotusphere 2011 SHOW104Lotusphere 2011 SHOW104
Lotusphere 2011 SHOW104
 
Understanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdfUnderstanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdf
 
Email Management and Email Archiving
Email Management and Email ArchivingEmail Management and Email Archiving
Email Management and Email Archiving
 
Cloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsCloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency Communications
 
Biscom Delivery Server Sales Presentation
Biscom Delivery Server Sales PresentationBiscom Delivery Server Sales Presentation
Biscom Delivery Server Sales Presentation
 
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents
 

Dernier

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Dernier (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Secure Email Overview - NeoCertified Demo

Notes de l'éditeur

  1. Splash screen until all webinar participants arrive – We will be starting in one minute, and are just allowing for a few other banks to join us Conference Dial-in Number : Conference Recording Subscriber PIN code: 753585# To start recording, host hits: *9, then the PIN To stop recording, host hits: *9
  2. OK, let’s get started. I would like to kick this webinar off commending each of you for taking email security in consideration for your bank or credit union. My name is Brent Faulk as I have worked with some of you before and I will be your host today. In today’s brief webinar I hope to get you more familiar with why this is a serious matter that is worth your time, some information you may or may not know, and how to take steps to meet compliance standards while taking care of your customers and business partners. Also, joining us today is President and Founder of NeoCertified, Peter Schaub < Why should secure email be considered >
  3. Now a little about who NeoCertified is… One more thing – We believe that security is process not just a product, so this could be a part of your overall solution < Why should secure email be considered >
  4. So why should secure email be considered? As you are probably aware this has become a hot topic with bank auditors recently. Federal mandates, legal requirements, and specific state laws mandate securing communication of personal financial information. The GLBA 501b Act clearly requires the “transmission and storage of personal information” in financial institutions. This refers to financial institutions to customers. The Sarbanes-Oxley Act (or SOX) requires secure transmission of financial information between financial institutions and vendors. Regulators have a heightened sense of scrutiny, particularly on banks that are not CAMELS 1 or 2 RATED. Beyond the legal requirements, secure email demonstrates to your customers, your respect for their privacy. With IDENTITY THEFT, all over the news, isn’t this what many of your customers are requiring. < How are you sending information now? >
  5. So with all that in mind, most large banks already have this in place. We specialize with small to medium sized institutions and have found that many have had a “NO SEND POLICY” in place. Others will have a cumbersome system in place or simply expect their customers to take care of all communication in person or by mail. In reality, now in 2010 email is a prolific part of business and customers have come to expect it. While we are on the subject, please consider how you currently manually send information. What are the costs associated with those processes? Some examples of information transactions could be: loan packages, board of director minutes, regulation Z notices, …… Auditors are asking, “What are you doing for secure email encryption?” and “Where does that data reside?” < Why it should be a commercially viable & simple solution >
  6. A major problem that banks are facing is the use of a awkward system that is either ‘too techie’ or meant for a consumer. The net result is it’s not used and information is sent our unprotected while most think there is a system in place. A viable solution should be implemented that is easy to use, accredited, and one that does not create additional IT burden for you. These are all factors that should be considered regardless of the solutions you consider.
  7. The harsh reality of email is that is sent in “clear text” and is highly vulnerable. Case after case of hacked, leaked, and stolen information from all types of organizations have caused billions of dollars in damage. From first hand experience of identity theft from my bank, I can tell you it takes considerable time and effort to repair. The Identity Theft Resource Center just published it’s 2009 Data Breach Stats on 12/29 reported over 222 Million Records exposed. This is no small matter
  8. There was a bit of controversy with this portion, but to demonstrate how easy it really is…
  9. As mentioned in the recent newsletter, “The Identity Theft Resource Center just published final statistics for 2009.  In total, over 222 million records of personal records were exposed.  Many of these came from the financial sector ranging from small community banks and credit unions to enterprise level banks.” nearly 10 million Americans lost $48 billion in 2008, due to online identity theft.1 Also that year, more than 35 million data records were breached in the United States. OK, let’s look at the actual NeoCertified Solution. < Ways to send secure Email with NeoCertified >
  10. There are 2 ways to send Secure Email with NeoCertified. 1 – From any Internet Browser --- first, I want to show you from the Internet, afterwards I will show you how secure email can be accomplished exclusively through Outlook 2 – From any version of Outlook We’ll take a quick look at both < Accessing your secure email from the Internet >
  11. Any registered user can remotely check, send, and receive secure email from any online computer. This is great when travelling, or from home if need be.
  12. This is the experience of a recipient….
  13. As soon as they click on that link a Secure Socket Layer (SSL) connection is initiated, the recipient creates their own pw (there is a forgot pw process, so there is no additional management on your part)
  14. ARE IN INTERESTED??? TRY IT OUT! This is what you do GET: Send Certified Button Internet Access – Secure Messaging Center Co-Branded Site Support (365/7) GLBA 501b Compliance