Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

. What are the things you can implement as part of the secure email strategy tha

ID: 3595544 • Letter: #

Question

. What are the things you can implement as part of the secure email strategy that will protect your company from becoming a statistic?  Write your results in the form of a paper – should be at least 4 pages with implementations, facts, case study examples, and conclusion. Using MIMEcast case study in your own words

MIMECAST LAUNCHES THE MARKET’S LEADING MULTIPURPOSE ARCHIVE SOLUTION

Mimecast Cloud Archive Offers Enhanced Features Including Mobility, Data Recovery & Preservation Needed To Manage Email Today

Watertown, MA – October 10, 2017 – Mimecast Limited (NASDAQ: MIME), a leading email and data security company, today announced the launch of Mimecast Cloud Archive, the leading multipurpose archive solution built for the cloud. Mimecast Cloud Archive delivers an all-in-one cloud service that integrates: a secure data repository, built-in data recovery, storage management, e-discovery and compliance capabilities. Mimecast Cloud Archive enables customers to access their email archive anywhere, anytime, and on any device in record speed. Latest innovations will be featured at the Mimecast Cloud Archive global virtual event on October 11, 2017. Mimecast also revealed new data, revealing organizations’ top challenges with archiving solutions.

Eighty-eight Percent of Organizations Struggle with Existing Archive Solutions: Get New-School About Archiving

Legacy on-premises and first generation cloud email archiving platforms have become obsolete, as the way organizations use email has completely changed since archiving’s inception nearly two decades ago. According to new global data from Mimecast and Vanson Bourne, 88 percent of organizations responded that they have experienced problems with their existing archiving solution. Nearly 60 percent cite administrative complexity as a top challenge, while 48 percent experience a lack of scalability. Another 56 percent are plagued by slow search performance. Mimecast Cloud Archiveis designed and optimized for the cloud, offering the scale, performance and advanced features needed to manage email today.

“Most email archiving technology was built when email usage was much different. With email being the top communications channel for business, it’s growing at a rate where these on-premises solutions can’t keep up,” said Peter Bauer, chief executive officer, Mimecast. “Archive needs to be thought of as a digital memory– with multiple dimensions that secure corporate data, empower employees with anywhere, anytime access to email, and ensure regulatory and compliance obligations are met. With Cloud Archive, we’re able to give customers the confidence and control they need, with the industry’s fastest search speeds, to get more value from their email data today.”

Mimecast Cloud Archive latest innovations enable:

E-Discovery and compliance are made easy by leveraging the fastest search performance in the industry. Robust, intuitive tools simplify administrative and e-discovery searches for IT administrators, compliance teams, and legal professionals.

Data recovery with Sync & Recover offers independent, immutable, always-available archives to hedge against data loss or corruption, giving organizations a means to restore their Outlook content – including email, personal folders, calendar entries and contacts – should misfortune strike.

Business insights found in Case Review App allow for fast, effective search of email and attachment data to serve myriad missions, including compliance reviews, litigation case assessments, and internal policy audits. Additionally, Mimecast’s latest integration with Salesforce.com allows for Cloud Archive access and fast search capabilities within the CRM tool.

Long-term data preservation with the archiving of email and attachment data into perpetuity, with no additional fees or charges for storage or retention duration.

“Archiving is intended to perform two vital functions: preserve data and simplify data management functions like search and e-discovery. However, many archiving platforms use on-premises architecture that isn’t able to cost-effectively handle the growing volume of email communications that is the ‘norm’ for businesses today,” said Andrew Smith, senior research analyst at IDC.Buyers – and the market as a whole – are quickly moving to cloud-based archiving solutions that allow for better scale, performance and value.”

The Need for Anywhere, Anytime Archive Access

Mimecast’s new research also found that fifty percent of organizations noted mobility, faster search speed and end-user accessibility as top priorities. Organizations that give employees access to their own email archives enable them to work anytime, anywhere and increase productivity and streamline collaboration. This access also reduces the burden on IT. Ninety-four percent of organizations reported that if their email archiving solution included mobile apps for employees to access personal archives, they would roll them out, with one-fifth saying they would roll them out “without a doubt.”

Mimecast Cloud Archive includes new capabilities that empower employees with fully integrated email management from anywhere, and enhances security by ensuring full IT control over deployment, content access and revocation using their chosen Enterprise Mobility Management solution. Employees can self-serve for rapid archive search, security controls and always-on email whether using a corporate device or their own, increasing productivity.

Mimecast has partnered with BlackBerry, a leader in Enterprise Mobility Management, to ensure Mimecast Mobile can be deployed securely and with the management, access and content controls required. Support for other leading mobility management platforms will follow.

“We live in an always-connected world, and employees have grown to expect access to their corporate email archives anytime, from anywhere,” said Mark Wilson, SVP and Chief Evangelist, BlackBerry. “While this helps drive productivity and collaboration, organizations need to ensure that corporate data is secured in line with policy no matter the device used or if the employee is on or off the corporate network. We’re excited to help Mimecast give IT and security teams the ultimate control over employee access and authentication, while enabling employees to stay productive.”

Mimecast Resources

-        Learn how to achieve a perfect-world archive by reading the ‘It’s Time to Break-up with your Old-school Archive’ e-book

-        Learn how mobility may be your archive’s missing link in this infographic

-        Get a quick view on the Unleash the Power of Corporate Data with a Multipurpose Archive data sheet

-        Download Forrester Consulting study to find important findings on the email archiving needs of modern business users

Mimecast Social Media Resources

Explanation / Answer

Email has become a top mean for the communication everywhere, where in colleges or organizations or even personal.

As, the time has advanced, so is the technology and so we are. So, with the time the way of using email service has also changed and nowadays we rely quite a lot on emails. So, we want to get the email service as fast as it can become and as secure as it can become.

MIMECAST is a great example of adaption and innovation with the time and needs of the customers. They've come up with new infrastructure and design to enhance the experience of usage of emails.

Mimecast Cloud Archive delivers an all-in-one cloud service that integrates: a secure data repository, built-in data recovery, storage management, e-discovery and compliance capabilities. Mimecast Cloud Archive enables customers to access their email archive anywhere, anytime, and on any device in record speed.

Mimecast Cloud Archive latest innovations enable:

E-Discovery and compliance are made easy by leveraging the fastest search performance in the industry. Robust, intuitive tools simplify administrative and e-discovery searches for IT administrators, compliance teams, and legal professionals.

Data recovery with Sync & Recover offers independent, immutable, always-available archives to hedge against data loss or corruption, giving organizations a means to restore their Outlook content – including email, personal folders, calendar entries and contacts – should misfortune strike.

Business insights found in Case Review App allow for fast, effective search of email and attachment data to serve myriad missions, including compliance reviews, litigation case assessments, and internal policy audits. Additionally, Mimecast’s latest integration with Salesforce.com allows for Cloud Archive access and fast search capabilities within the CRM tool.

Long-term data preservation with the archiving of email and attachment data into perpetuity, with no additional fees or charges for storage or retention duration.

“Archiving is intended to perform two vital functions: preserve data and simplify data management functions like search and e-discovery. However, many archiving platforms use on-premises architecture that isn’t able to cost-effectively handle the growing volume of email communications that is the ‘norm’ for businesses today,” said Andrew Smith, senior research analyst at IDC. “Buyers – and the market as a whole – are quickly moving to cloud-based archiving solutions that allow for better scale, performance and value.”

The Need for Anywhere, Anytime Archive Access

Mimecast’s new research also found that fifty percent of organizations noted mobility, faster search speed and end-user accessibility as top priorities. Organizations that give employees access to their own email archives enable them to work anytime, anywhere and increase productivity and streamline collaboration. This access also reduces the burden on IT. Ninety-four percent of organizations reported that if their email archiving solution included mobile apps for employees to access personal archives, they would roll them out, with one-fifth saying they would roll them out “without a doubt.”

Other Protective Measures:

Symmetric Encryption

In symmetric encryption, you and your friend share a “secret” key. Using this key, you can encrypt a message into “cyphertext”. Cyphertext looks like a random sequence of characters and is completely meaningless to anyone unless they also have the secret key, in which case they can decrypt the cyphertext back into the original message and read it.

Using symmetric key encryption, eavesdropping and unwanted backups of your messages no longer are a problem (unless the eavesdropper knows what your secret key is). It also becomes harder for someone to modify your messages in transit in any kind of a meaningful way.

An example of a popular, excellent method used for symmetric encryption is AES-256.

Message Digests / Authentication Codes

Splitting of the original meassage through an algorithm takes place. The sequence of characters is a "fingerprint" of the message. ”. There is no way to “reverse engineer” the original message from its fingerprint and it is almost “impossible” to find two messages that yield the same fingerprint.

SHA-2 is one of the examples of this type of encryption.

ASYMMETRIC ENCRYPTION

It has two keys. Any cyphertext created using one of the keys can ONLY be decrypted using the other key. In asymmetric key encryption, the two keys that each person possesses are commonly named the “private” and “public” keys because the “public” one is published or given out freely to anyone who wants a copy and the “private” one is kept secret.  

SECURING EMAIL WITH TLS - Applying transport layer security SSL / TLS is one of the easiest way to secure our emails. TLS uses a combination of asymmetric and symmetric key encryption mechanisms. The server uses its private key to prove to you that it is in fact the server that you are trying to connect to. This lets you know that you are not connecting to a “middleman” that is trying to intercept your communications.
You send the server your public key.
The server generates a “secret key” and sends it to you encrypted using your public key.
You and the server then communicate using symmetric key encryption using this shared secret key. (Symmetric key encryption is faster than asymmetric key encryption).
The benefits of TLS are twofold: 1. you can determine if you are connecting to the right server, and 2. you and the server can communicate securely.

The ultimate solution is to use asymmetric key encryption to provide message signatures and/or encryption. This completely solves the issues of:
Eavesdropping (everything is always encrypted)
Message modification (message digests are used)
Message replay (you can include a timestamp in the signature)
Repudiation (signatures allow proof of who sent the message)
Unprotected backups (everything is always encrypted)
Asymmetric key encryption should be used in combination with SSL so that your username and password (and messages headers such as the subject) are also protected.

THANK YOU.