This document discusses OptfinITy's cloud-based email security services. It provides an overview of OptfinITy's history and services, describes the benefits of cloud computing and email encryption, and outlines OptfinITy's multi-layered email security platform which filters out 96.5% of spam and viruses while ensuring delivery of legitimate emails.
2. OptfinITy
Founded in 2002 with a focus on providing Peace
of Mind to small businesses and non-profit
organizations.
Headquartered in the Washington, DC
Metropolitan area with clients across the United
States.
Have worked with over 200 clients.
3. IT Strategy and Assessments
Managed Services
24 x 7 Network Operations Center
24 x 7 Technical Support Helpdesk
Infrastructure Support
Software and Database Development
Website Development
Content Management (CMS Works, Wordpress)
Sharepoint
Search Engine Optimization
Mobile Application Development
iOS (iPhone, iPad), Android (Phone & Tablet)
Phone Systems
4. Cloud computing is the delivery of computing
as a service rather than a product.
In cloud computing, you do not purchase the
server or software but rather use shared
resources, hardware, software, and information
and pay on an as-needed or per use basis.
5. It is sold on Demand Increased
It is elastic allowing Collaboration
a user to have as much Easy to Setup and Get
or as little service as Running
they want at any given
time. Consolidation of
Centralizing Updates numerous servers
for Software as a Upgrades to hardware
Service can be done virtually,
Reliable AND eliminating down time
Accessible
7. What is Email Encryption?
The process by which you ensure that only the correct
recipient of an email message is able to read it.
Encryption renders the text unreadable to anyone who
cannot decrypt it.
Why Do I Need Email Encryption?
Do you use envelopes to mail important letters?
Unencrypted emails are much less secure than postcards.
Anyone can ready, copy, store, and change the contents
of an email.
Regulation compliance issues.
8. All Companies Are Challenged to Enforce No
Send Policy
Continue to Train Employees on Proper Use of
Email
Use Manual Processes
Fax, Mail, Courier
CD/Tape and Ship
Password Protect Documents or Zip Files Individually
13. Eliminate Cost Related to Handling Confidential Data
Cost of Data Security Breach
Reputational Risk
Immediate Delivery of Confidential Data
Go Green! Reduce Amount of Paper
Regulatory Compliance Issues
State Data Security Laws
Identity Theft Red Flags Rule
FDIC Updated Information Technology Officers
Questionnaire
HIPAA 2.0
15. Email Burden is Growing
Email is Primary Corporate Communication Tool:
Sales and Contract Negotiations
Invoicing
Customer Management
Internal Reporting
Average Corporate User Handles 23K emails/year
Average Use 21 MB/Day, 5GB/Year
61% Companies Enforce Mailbox Size Quotas
Average 90 Minutes/Day to Manage Email
80% Intellectual Property Stored in Email
16. Retention is Not Assured
Deleting is Company Policy
Relying on Employees to be Good
Business Continuity at Risk
Recovery is Software Dependent
Discovery Takes Time and $$$
17. Reflexion Archiving, Discovery, and Recovery
Hosted Email Archiving Service that Operates with
your Email Infrastructure
Ensures Protection, Preservation, and Continuous
Operation of Email Communication
All Incoming, Outgoing, and Internal Email and
Attachments are Filtered, Indexed, and Encrypted
Dynamic Data Retention
eDiscovery Finds Any Email or Attachment in the
Archive
Hosted Cloud Service Provides Continuous Access to
Email
18. Active Email Archiving
Hosted Service Works with Existing Email Platform
Focused on Discovery and Recovery
THE INTERNET YOUR NETWORK
EMAIL CONTINUITY
All inbound and outbound YOUR BUSINESS
INCOMING Emails are accessible
FILTERED Through a WebUI for Email Safe, filtered email is
EMAIL & Business Continuity Delivered to your inbox
AUTOMATIC BACKUP
A copy of all safe emails
Are stored here.
20. Automated Email Continuity
Maintain a Historical Reference/Knowledge Base
Document Compliance and Performance
Provide Disaster Recover/Business Continuity
Reduced Energy Consumption
22. Spam is the use of electronic messaging systems to
send unsolicited bulk messages indiscriminately.
80 85% of all emails worldwide are spam.
A computer virus is a program that can replicate
itself and spread from one computer to another.
Malware is not technically a virus.
Malware includes computer viruses, worms,
Trojan horses, rootkits, spyware, adware and other
malicious software.
23. What would your clients do if they knew you didnt
have security in place?
In 2006 malware damages exceeded $13.3B
worldwide
Loss of productivity
Cost of IT (staff time and/or fees)
Cost to restore or re-create lost data
Potential for fines and penalties
24. Security is a lot more complex than installing a
firewall and keeping anti-virus software
subscriptions up to date. -- Robert Biddle, Director
Member Programs, Computer Technology Industry
Association
A secure environment provides protection, prevention
and remediation
A security platform performs multiple functions in a
multi-layer approach: Firewalls to control network
access, filter Web content and email, encryption
protocols, and intrusion prevention and detection.
25. RBL Protection
85%
Check for Known Users
Scan for Viruses
.3%
2.1%
Check Allow List
Check Block List
.1%
.3%
.5% Address-on-the-Fly
Check Permitted Languages
.1%
96.5% of all incoming SMTP connections blocked as spam and viruses!
Check Permitted Countries
.5%
Heuristics / IP Reputation
9%
Bayesian Filtering
1%
1.1%
3.5% of all incoming SMTP connections delivered to recipients!
26. Multi-Layered Defense-in Defeats Directory
Depth Harvesting & Denial of
Geographic & Language- Services Attacks
Based Filtering Support SMTP
Identified Address Restrictions
Sharing Automatic Spooling of All
Outbound Anti-Virus Incoming Email for 3
Scanning Days
Open Relay & Zombie Optional Email
Prevention Archiving, Discovery &
Avoids IP Address Recovery (RADAR)
Blacklisting Spam/Virus Handling:
Vaporize/Quarantine/
Flag
28. Control and Access to Your Mailbox
Block Unwanted Mail; Spam, Viruses, DoS Attacks,
Phishing Attacks
Assures Delivery of Desirable Mail
Helps Preserve Long-Term Integrity of Users Primary
email Address
Allow Lists, Block Lists, Content Filtering
AOTF (alternative email addresses), Permitted
Language and Country Capability
Spooling Inbound Email for 10 Days When Local
Server Experiences an Outage
Outbound Email Filtering