Enterprise Email Security and Control for Banking

Enterprise Email Security and
Control for Banking
EMAIL IS A HIGHLY VALUABLE AND HIGHLY RISKY TOOL
Email is the most efficient means we have to share digital information, because everyone uses it—employees inside
the bank, and clients and others outside it. In fact, we likely use email more than any other application. Email is so
valuable because it creates a “community of interest” where people with a mutual need to communicate and share
information can do so conveniently. At the same time, email carries a set of risks perhaps greater than any other
application in the enterprise.
—— Our email inboxes are some of the most common targets for hackers. While we may store financial, customer
and other critical corporate information in secure file systems, we are just as likely to have countless copies
of that same information stored in our email inboxes. Each of our devices where we use email keeps copies of
that sensitive information. Loss of that sensitive information could be devastating to a bank, from a regulatory
and reputational perspective.
—— When we send someone an email, we abdicate control over the content. The recipient can do virtually anything
with it—intentionally or accidentally. Furthermore, recipient devices or email servers could be breached,
releasing your information.
—— Hackers use email as the access point to penetrate our “community of interest,” by impersonating an individual
or institution we trust. Banks and their clients are some of the most common victims of these attacks, because
banks have a high trust relationship with their customers and both regularly exchange valuable information.
Hackers impersonate bank employees to get clients or other bankers to reply to messages with sensitive
information, or click on links and open attachments that download malicious software.
THERE ARE LOTS OF PARTIAL TECHNOLOGY SOLUTIONS
Since email is so often used to share highly valuable information, we’ve deployed multiple compensating and
cumbersome systems to address some of the risk.
—— Mobile device management systems lock entire devices, but do nothing to protect the actual data on the
device. As soon as you log in, all your information is in the clear, and any attacker who has installed malware on
your device can take all your data. These systems are notoriously intrusive and expensive.
—— File sharing portals may protect files in the repository, but email conversations can be just as sensitive as a file,
and file repositories don’t protect those conversations or any attached files.
—— “Secure” email systems and portals encrypt your messages in transit, or perhaps in the cloud, but these
systems fail to encrypt the data on the most easily compromised part of your network—your own device—and
they do nothing to protect your data on your client’s devices.
• Consider how much of your data is actually moving at any given time, as opposed to sitting in storage on
your device, which is your biggest risk.
• These systems let you send an encrypted message, but your clients have no ability to initiate secure
communications with you, which is senseless when you actually need to have a conversation, and doesn’t
honor the relationship you want to have with them.
• In virtually every case, the email service provider has your encryption keys, and they can be hacked, make
a mistake or be forced to give up the information in a manner you can’t control.
• None of these systems protect bank clients from phishing attacks, where hackers impersonate a bank
employee or the bank.
Absio Corporation • (720) 836-1222 • www.absio.com
©2016 Absio Corporation
110-DS016-1
Enterprise Email Security and
Control for Banking
ABSIO DISPATCH IS THE ONLY COMPLETE SOLUTION
Absio Dispatch, originally designed to secure battlefield communications, enables all the great features of email, and
provides the security and control no set of partial solutions, even in combination, can provide.
—— Users choose with whom they want to communicate via a connection process like social media. This process
authenticates each user to the other cryptographically, so they cannot be impersonated and serve as an access
point to your network or clients.
—— Every message and attachment is distinctly encrypted with its own key. Absio never has access to your private
encryption keys and can’t read your messages and files. Your administrators control your company’s encrypted
content, not Absio.
—— Messages remain encrypted on both sender and recipient devices. Dispatch messages are only decrypted
one-at-a-time while they’re being read, and are re-encrypted when closed.
—— Senders can apply real distribution controls to the messages, ensuring recipients can only take actions (e.g.,
forward, save, etc.), or have access to the messages, in the way intended by the sender.
—— Dispatch is available for virtually every operating environment used in the enterprise, including as a plug-in
to Outlook� for Windows®, and as a standalone application for Mac®, Windows®, Android™ and iOS® devices.
Dispatch will also soon be available as a web viewer, for those situations in which you really do only need
to provide a one-way notification. Dispatch also integrates with your existing information security systems,
including data loss prevention, threat mitigation, and email archiving tools.
CONSIDER THE POSSIBILITIES ONCE YOU DEPLOY DISPATCH IN YOUR BANK.
—— Know with certainty who you are communicating with, and enable your clients to trust the emails that come
from you.
—— Securely distribute and discuss sensitive information with board members, senior executives, HR, legal, M&A,
compliance, and other bankers regarding client matters.
—— Differentiate your services by offering your key lending and wealth management clients a free, easy-touse application for exchanging sensitive information with you, instead of giving them no option other than
accepting the risk of sending materials via email, or physically handing you paper, a jump drive or a CD.
—— When necessary, control what your recipients can do with information and how long they can access it, such
as when negotiating loan agreements that are time-sensitive or communicating with trusted advisors like
lawyers and accountants.
—— Move beyond simple compliance to proactively securing internal and client communications.
With Dispatch, you can securely digitize your community of interest without managing multiple hardware or
software installations. Finally, you can return to a world where information can be shared securely, and sensitive
conversations can be protected. Contact us to learn more.
Absio Corporation • (720) 836-1222 • www.absio.com
©2016 Absio Corporation
110-DS016-1