Browse communities
Browse communities
Presenting a webinar?

Increasing Encryption Deployment- Response to Compliance & Cyber Attacks

Larry Ponemon, Ponemon Institute
Thales e-Security and Ponemon Institute have partnered within the security community to identify and understand the trends that shape the market. This webinar will examine the usage of encryption and how it has been evolving. Having recently completed the “2011 Enterprise Encryption Trends Report” that focuses on compliance pressures and cyber-attacks targeting sensitive data that is leading IT organizations to alter their encryption strategies, this webinar will provide insight from surveyed I.T. workers across various job functions. You'll hear how they're leveraging encryption technology in order to protect their critical information assets. Since compliance laws differ around the world, encryption trends tend to vary greatly in various markets. Are your assets being fully protected?

Join Thales e-Security and guest speaker Larry Ponemon to learn more about this exciting webinar topic on April 26, 2012 at 2:00 pm EST!
Apr 26 2012
41 mins
Increasing Encryption Deployment- Response to Compliance & Cyber Attacks
More from this community:

Application Development

  • Live and recorded (1513)
  • Upcoming (21)
  • Date
  • Rating
  • Views
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • As organizations journey into the cloud – public, private, or hybrid, it is so easy to accidentally build application silos and fragment business processes.

    Watch this webinar to learn how SAP HANA Cloud Integration can help integrate processes and data for a smooth experience across cloud and ground applications and application extensions.
  • For years ClearCase was the standard for enterprise SCM. If you had a large number of developers and lots of projects ClearCase was a great choice, while ClearCase MultiSite provided basic support for distributed teams. Now industry trends are converging toward a new generation of development tools and processes. Today, continuous delivery brings agile development and DevOps together, promising much shorter development cycles and higher quality.

    Learn how moving from ClearCase to Subversion can improve your development processes and significantly reduce deployment cost and complexity. You'll also learn practical ClearCase to Subversion migration techniques.

    Topics Covered:
    • Differences and similarities between Subversion and ClearCase
    • How to merge in Subversion
    • Continuous delivery using Subversion: bringing agile and DevOps together for faster delivery and higher quality
    • ClearCase vs. Subversion in a distributed development environment
    • Migrating from ClearCase to Subversion
  • HP Software Customer Spotlight Webinar Series 2015
    The Big Data service desk: HEMIT talks HP Service Manager & Smart Analytics

    Join us to discover the power of Big Data at the service desk as HP customer HEMIT presents their success story. Using modern data analysis adds tremendous insight and value to the service desk by leveraging so called unstructured data, which makes about 90% of all data. HEMIT is the IT service provider for hospitals in central Norway. By using HP Service Manager Big Data Edition and Smart Analytics, HEMIT is making its service desk more intelligent and providing Smart Ticket and Hot Topic Analytics capabilities. HEMIT’s projected results are 50% time saved on completing self-service tickets and a short 12 month ROI.

    Why attend?
    • Leverage HP IDOL technology and Big Data for the cutting edge service desk
    • Improve your service desk productivity and increase service quality
    • Do more with less and still improve the overall business value of IT
    • Simplify user experience and improve service desk agent productivity
    • Get answers to your own questions during the live Q&A session

    ‘‘It is probably the most interesting piece of software I’ve seen in the last 10 years. The IDOL engine behind all this - it is really, really cool.’’

    -Thore Senneset, Incident Manager IT-Service, HEMIT (featured webinar presenter)
  • Join Ntirety, a division of HOSTING and the leading data services organization in the country, in this discussion of the impact that database administration can have on individuals, organizations and — most importantly — bottom line revenue. This interactive webinar will cover:
    •DBA Burnout and Retention
    •The DBA’s Role in Major Platform Shifts and Regulatory Compliance
    •The Accidental DBA Due to Staff and Skills Shortages
    •The “Half a DBA” Problem -- When You Don’t Need a Full-time DBA
    •The IT Budget Crunch
    •Q & A
  • Cloud is the ticket to innovation and agility, but the ride can be bumpy if organizations address integration just as an afterthought.

    Watch this webinar to understand SAP's cloud integration strategy, solution, and roadmap to address cloud integration challenges.
  • GitLab provides streamlined social coding and collaboration for Git development teams. But under the hood it's a powerful enterprise Git management platform. In this webinar we'll present best practices for managing permissions and users with LDAP and Active Directory, working with large binary files, code reviews and workflows, and clustering and replication. From security to performance and disaster recovery planning, this webinar will guide you to a rock-solid GitLab deployment.
  • Agile, at its best, leads to efficient scaling and dynamic responsiveness to software delivery release cycles—improving business value and cutting execution times. However, many teams have difficulties meeting these lofty goals.

    With large and complex projects, it’s difficult to get everyone working and thinking together on strategic business objectives and project targets. It takes a combination of people, processes, and technology to make this work.

    Join Tye Davis and John Falk for this web seminar as they teach you how to:

    Build in quality support and project visibility
    Get all agile stakeholders on the same page
    Provide insight into the entire project landscape, workflow, and potential issues or bottlenecks
    Bolster agile practices, foster continuous improvement, and remove project delays
    Check the quality of the code before each build
    Learn more about HP’s agile quality solution through a demo of Agile Manager.
  • L’objectif du webinar sera d’expliquer comment le déploiement continu des applications facilite la transformation digitale. La discussion sera agrémentée d’exemples concrets de clients qui ont commencé cette transformation dans divers secteurs d’activité : bancaire, distribution.

    Translated:
    Application continuous deployment allows digital transformation
    The objective of the webinar will be to explain how continuous application deployment facilitates digital transformation. The discussion will provide examples of clients who have started this transformation in various domains of activities such as banking and distribution.
  • You’ve heard the Buzz about Business rules. now, learn what they can do for your business. Learn how Progress® Corticon® can help developers and business users collaborate to handle the complex, rapidly changing regulatory requirements and business logic changes that company strategies and policies demand.

    Achieve significant impact to your top and bottom line to boost ROI and reduce time-to-market.

    Watch this webinar series to learn:
    * What exactly is a business rules engine, and why should your business use it?
    * How can Progress Corticon deliver the high-performance, automated decisions businesses need to compete.
    * How using a rules engine can speed deployment at a fraction of the time and cost by avoiding the need for “hard coding”
  • Channel
  • Channel profile
  • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs Apr 29 2015 4:00 pm UTC 105 mins
    Ian Hermon
    Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs Apr 29 2015 9:00 am UTC 105 mins
    Ian Hermon
    Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • Applications that go bump in the night Recorded: Mar 12 2015 52 mins
    Richard Moulds, VP of Strategy at Thales e-Security, and Derek Brink, Vice President- Information Technology, Aberdeen Group
    The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step further to become tamper resistant. Trusted applications that handle sensitive data, control valuable IP and perform critical processes can be isolated and protected within secure execution environments. Mobile phones, embedded devices and data center servers all adopt physical hardening to secure the applications they host. This webinar focuses on protecting business applications that support high-tech manufacturing, content distribution, online authentication – in fact any situation where you need to know for sure that your application is doing precisely what the developer intended – nothing more, nothing less.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Nov 20 2014 39 mins
    John Grimm, Sr Director Product Marketing, Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we saw with the Heartbleed OpenSSL vulnerability and more recently with POODLE, encryption is no silver bullet and can’t be taken for granted. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, November 20th, to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • High Assurance Security for Mission Critical Applications Recorded: Oct 22 2014 61 mins
    Chris Glidden, SE Federal Thales - Bob Smith, SE Manager F5 Networks- Brian Jones, VP Federal & Mid Atlantic FishNet Security
    Downtime of critical networked applications can cost your company lost revenue opportunities in the short term, as well as long term negative impact on your brand. Attacks can interrupt the availability of critical applications or compromise sensitive data traversing your network.
    Securing critical applications to ensure availability is imperative.
    Integrating hardware security modules (HSMs) with intelligent network managers allows you to trust that data traveling across your network is encrypted and secure from unauthorized users.
    Join F5 Networks, Thales e-Security and FishNet for a free webcast to learn how to optimize and secure the delivery of critical applications. You’ll learn how F5’s BIG-IP System integrated with Thales’s nShield HSM can:
    •Deliver high performance processing
    •Provide robust security
    •Meet regulatory compliance standards
    •Secure data while improving data center performance
  • Host Card Emulation (HCE): How to take direct control of mobile payments” Recorded: Oct 22 2014 61 mins
    David Worthington, Principle Consultant Payment at Bell ID, Ian Hermon, Product Marketing Manager Payments, Thales e-Security
    This webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved.
  • Protecting Your Sensitive Data Does Not Have to Impact Business Operations Recorded: Sep 17 2014 61 mins
    Juan Asenjo, Senior Product Marketing Manager, Thales e-Security, Mark Bower, VP Product Management , Voltage Security
    Highly publicized software attacks and data breaches, combined with strict regulatory requirements, reinforce the ongoing risks associated with cardholder data at all points in the payment stream. The risks to data are everywhere, and your organization is ultimately responsible for the security of customers’ personally identifiable information (PII). This means you must protected PII not only during transaction processing, but also through business processes such as charge-backs, loyalty or repeat payments, storage and analytics – including outsourced environments.
    Voltage SecureData™ enables you to ensure sensitive data is de-identified while maintaining logical and referential integrity so it can remain in a protected state while still usable for critical business processes. Integration of Voltage SecureData with Thales nShield® hardware security modules (HSMs) provides enhanced safekeeping and management of critical cryptographic keys that underpin the security of the process. Enforced protection of sensitive data using policy driven data security enables you to protect PII across your entire workflow without disrupting operations and ensuring you can adhere to privacy regulations.
  • Host Card Emulation (HCE): How to take direct control of mobile payments Recorded: Sep 16 2014 60 mins
    Ian Hermon, Product Marketing Manager - Thales e-Security, David Worthington, Principal Consultant - Bell ID
    For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availability of compatible mobile phones top the list of potential barriers. The incremental cost to support secure elements as well as companion credit/debit cards made the business case questionable for issuers.

    A recent update to the Android operating system has changed things forever – no longer does an issuer need a secure element in the mobile phone or a third party to provision the application to offer a secure mobile payment solution compatible with all NFC contactless point-of-sale (POS) terminals. A technology known as host card emulation (HCE) enables issuers to take direct control and fast track time to market.

    A webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved, including:
    •An HCE technology overview
    •How the payments are secured
    •Benefits achieved by early adopters
    •Insight into how HCE is likely to evolve

    Please register using the appropriate button below for the time slot suitable to you on Tuesday 16th September 2014. We look forward to your participation and questions.
  • Host Card Emulation (HCE): How to take direct control of mobile payments Recorded: Sep 16 2014 60 mins
    Ian Hermon, Product Marketing Manager - Thales e-Security, David Worthington, Principal Consultant - Bell ID
    For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availability of compatible mobile phones top the list of potential barriers. The incremental cost to support secure elements as well as companion credit/debit cards made the business case questionable for issuers.

    A recent update to the Android operating system has changed things forever – no longer does an issuer need a secure element in the mobile phone or a third party to provision the application to offer a secure mobile payment solution compatible with all NFC contactless point-of-sale (POS) terminals. A technology known as host card emulation (HCE) enables issuers to take direct control and fast track time to market.

    A webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved, including:
    •An HCE technology overview
    •How the payments are secured
    •Benefits achieved by early adopters
    •Insight into how HCE is likely to evolve

    Please register using the appropriate button below for the time slot suitable to you on Tuesday 16th September 2014. We look forward to your participation and questions.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Aug 21 2014 39 mins
    John Grimm, Senior Director of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we have seen recently with the Heartbleed OpenSSL bug, encryption is no silver bullet. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, July 17 to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Jul 17 2014 35 mins
    John Grimm, Senior Director of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we have seen recently with the Heartbleed OpenSSL bug, encryption is no silver bullet. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, July 17 to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jul 3 2014 46 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jun 26 2014 61 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jun 26 2014 60 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: May 22 2014 36 mins
    John Grimm, Senior DIrector of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Future Proof Your Network: EMV, Mobile and the Cloud are Here Recorded: Apr 30 2014 60 mins
    David Worthington, Principal Consultant at Bell ID, Ian Hermon, Product Mktg Manager Thales
    The EMV liability shift is fast approaching in the United States. Along with the emerging trend towards innovative mobile payment solutions, this means that core infrastructures need to be enhanced to support new payment methods and channels – often with additional security, risk and lifecycle requirements. Now is the time for financial issuers to develop a future payments strategy that will enable you to migrate efficiently and quickly to EMV chip based technology, and adapt to stay competitive in this period of high disruption.
    Attendees will learn:
    •Facts vs. myths about EMV and how it reduces fraud
    •How the top 5 short-term challenges of EMV migration can be solved
    •The versatility of EMV and real-world examples of how it facilitates so much more than fraud reduction
    •EMV uses beyond cards – mobile (NFC) payments & host card emulation (HCE)
    •Examples of Bell ID and Thales e-Security deployments for EMV card and mobile payments
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Apr 24 2014 32 mins
    John Grimm, Senior DIrector of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Persistent Information Protection, Deploying Microsoft RMS with Thales HSMs Recorded: Feb 12 2014 87 mins
    Microsoft, Synergy and Thales
    Want to have a deeper understanding of how to deploy Microsoft Rights Management Services (RMS) with the added capability of generating and controlling your own key that secure your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how to deploy Microsoft RMS with the unique bring your own key (BYOK) capability across multiple operational scenarios including:

    • Subscription-based service in Azure
    • On-premises in Windows Server
    • Cross-premises in mixed environments

    You will also learn how to take advantage of the BYOK offering to secure your RMS private key within a Thales hardware security module (HSM) to maintain control of the critical keys securing your most sensitive data and intellectual property.
  • Persistent Information Protection, Extending the Use of HSM Within Microsoft RMS Recorded: Feb 11 2014 58 mins
    Microsoft, Synergy Advisors, Thales
    Want to take advantage of the cloud for collaboration but feel you will lose control of your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how you can deploy a unique solution that enforces strict security policies on your data assets and achieves persistent information protection. Learn how to:

    • Deploy new features and capabilities of Microsoft Rights Management Services (RMS)
    • Protect your sensitive files in any format and in any device, including iOS and Android
    • Share protected information with anyone, inside and outside your own organization

    You will also learn how the unique bring your own key (BYOK) capability enables you to generate and safeguard your own RMS private key within a Thales hardware security module (HSM), ensuring you that Microsoft operators cannot see or leak the keys during import or use.
  • Identity as a Service – Strong Enough for Government? Recorded: Nov 13 2013 59 mins
    Richard Moulds, Thales e-Security, and Daniel Turissini, ORC Inc.
    For many companies thinking about moving sensitive data to the cloud, security issues remain a significant concern. But Operational Research Consultants Inc. (ORC) and Thales e-Security are proving that the cloud really can be made as safe or even safer than on-premise deployments even for organizations as security-focused as the U.S. Federal Government.
    Join Daniel Turissini, CTO, WidePoint Corp. and Founder of ORC, Inc., a WidePoint company, and Richard Moulds, VP Product Marketing & Strategy at Thales e-Security
Encryption and Key Management Solutions
Data protection and security solutions to help companies meet compliance and protect the security of your most sensitive data leveraging encryption and key management.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Increasing Encryption Deployment- Response to Compliance & Cyber Attacks
  • Live at: Apr 26 2012 6:00 pm
  • Presented by: Larry Ponemon, Ponemon Institute
  • From:
Your email has been sent.
or close
You must be logged in to email this