Michael Osterman, Principal of Osterman Research; Mark Schweighardt, Sr. Director of Product Management, Voltage SecureMail
*On this webcast we're giving away a pass to our partner event: Governance, Risk and Compliance for Financial Services on June 24-26*
2014 has been called "The Year of Encryption." The recent data breaches, personal identity theft cases, email snooping concerns, and a serious, far-reaching software vulnerability (i.e., Heartbleed) have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise. Email is invaluable to enterprises. It's the easiest mode of communication which also makes it an easy target for data theft.
As email users communicate sensitive data, often in the form of credit card numbers, social security numbers, phone numbers, personal financial data, and personal health information, it is sent and resent to multiple users and locations. Sometimes this data is secure, but all too often, it is not. This impacts companies of all sizes where email security vulnerabilities are both internal and external to the enterprise.
The need to protect private information being communicated by email between customers, prospects, patients, loan applicants, and clients is now the norm. Unfortunately, many enterprise email solutions are several years old and using outdated and ineffective security technology.
This session will explore the key concepts and best practices to protect and maintain private email communications and why you need to rethink your email security. Hear from two email security experts and learn:
- Best practices for securing sensitive email communications.
- When is the right time to replace your legacy email security.
- How to protect sensitive email information as it flows to and from the enterprise.
- Latest insights on Identity-Based Encryption and Stateless Key Management.
- How other enterprises deploy the world’s most popular email security solution.
- How end-to-end Identity-Based Encryption (IBE) helps protect email in the event of a vulnerability being exploited.