Policy-Enforced TLS Feature Sheet

ABOUT GOOGLE APPS Google Apps is a suite of applications that includes Gmail, Google Calendar (shared calendaring), Google Talk (instant messaging and voice over IP), Google Docs & Spreadsheets (online document hosting and collaboration), Google Page Creator (web page creation and publishing), Start Page (a single, customizable access point for all applications) and Google Security & Compliance. Google Apps offers editions tailored to specific customer needs, including the Standard Edition (ideal for family domains), Education Edition (K-12 schools, colleges and universities) and Premier Edition (businesses of all sizes). For more information, visit www.google.com/a/security

Secured Email Communications Without Complexity and Risk Email is the quickest and easiest way to communicate with business partners. However, without sufficient safeguards, sensitive data in email communications can leave organizations in violation of privacy requirements, industry regulations, and government mandates for data security. Encrypting email communications between you and your business partners helps your organization address compliance concerns and data privacy requirements, protecting you against the legal, financial, and brand equity consequences of failing to protect sensitive data in email. While many email gateways offer a besteffort option for implementing encrypted communications, this is unreliable and can leave email unprotected. As an integrated feature of Google Message Security and Google Message Discovery, powered by Postini, Policy-enforced TLS (Transport Layer Security) service offers your organization an affordable, easy-to-implement solution that automatically encrypts email communications between designated organizations. Encryption is seemlessly applied and always enforced to selected email domains, ensuring that the email will be delivered with the required security to be compliant with data privacy regulations. What Policy-Enforced TLS Service Does Policy-enforced TLS is an on-demand service which employs Transport Layer Security, an industry standard protocol, to automatically encrypt email connections between organizations. Google integrates strong TLS encryption with policy-based management tools, ensuring messages are delivered over encrypted connections.

Google Policy Management Sender Inbox

Encryption Required

Policy-Enforced TLS Mandatory Encryption

Recipient Inbox

Figure 1: Policy-enforced TLS service ensures that emails between trusted partners are always delivered via a secure connection.

policy-enforced tls

How Postini Policy-Enforced TLS Service Works Policy-enforced TLS allows you to establish private communications with partners, regulatory agencies, and other affiliates. Email messages are routed securely through Postini’s secure data centers over an encrypted connection, where another encrypted connection is opened to the destination server. The messages are then securely delivered directly to the recipient’s email server. Policy-enforced TLS service provides assurance that no sending or receiving email server will deliver or accept messages without the encryption required by your policy. The Policy-enforced TLS service encrypts the communications between designated domains while still enabling the email to be comprehensively scanned to ensure that messages are free of spam, viruses, or any other inappropriate content according to your organization’s messaging policies. On-demand service Completely hosted and managed by Google, Policy-enforced TLS requires no new software, hardware, or maintenance on site. Communications privacy Enforced domain-to-domain encryption prevents the sending of unencrypted emails, providing trusted secure communications with regular business partners without the cost of virtual private networks or leased lines. Easy implementation Automatically applies security without any additional integration requirements. Configuration takes minutes using the intuitive management console. There is absolutely no impact to email senders or recipients − no additional software or user keys required. Simple administration With a unified administrative console, you can easily set and update policies according to your security requirements, no encryption expertise is required. Seamless integration Policy-enforced TLS integrates seamlessly with other Google Security and Compliance services through a unified-policy management platform. Alerts and reporting Detailed reporting is available through the web-based administrative console and alerts are automatically generated if the encryption sessions cannot be established.

policy-enforced tlS

With Policy-Enforced TLS, you can: • Extend trust to partners by enforcing the use of TLS when communicating with their email domains • Easily enforce encryption from domain to domain without additional user steps • Rapidly secure inbound and outbound server connections for policy compliance • Define and enforce message encryption policies by domain • Defer communications that are not encrypted Conclusion Policy-enforced TLS enables organizations to securely exchange sensitive email with designated business partners. The strong domain-to-domain encryption helps organizations ensure that their email communications are in compliance with applicable data privacy regulations as well as their own internal policies for data security. The automatic, policy-based encryption is easy to implement and provides a cost-effective solution to ensure that the delivery of email is always secure.

Features

Benefits

Consistent, enterprise-wide unified-policy management

Automatically protects and encrypts email per policy without additional user or administrative intervention.

Assured policy compliance

Email encryption policies are always enforced, email will not be delivered without the required security.

No additional equipment to purchase

Reduces capital investment, ongoing administrative costs, and provides a low total cost of ownership.

Strong domain-to-domain encryption

Eliminates the need for managing multiple user certificates or encryption keys.

Simple, rapid implementation

Turn-key solution that can be rapidly implemented and leaves the user experience unchanged.

Integrated service

Integrates with Google’s comprehensive, trusted communications security and compliance services.

© Copyright 2008 Google. All rights reserved. DS54-0801

Policy-Enforced TLS

Figure 1: Policy-enforced TLS service ensures that emails between trusted partners are always delivered via a secure connection. ... Completely hosted and managed by Google, Policy-enforced TLS requires no new software ... Detailed reporting is available through the web-based administrative console and alerts are ...

229KB Sizes 3 Downloads 265 Views

Recommend Documents

Policy-Enforced TLS
... email domains, ensuring that the email will be delivered with the required security to be compliant with data privacy regulations. ... management tools, ensuring messages are delivered over encrypted connections. Figure 1: Policy-enforced ...

Policy-Enforced TLS - Devoteam G Cloud
your organization an affordable, easy-to-implement solution that automatically ... seemlessly applied and always enforced to selected email domains, ensuring ...

Policy-Enforced TLS - Devoteam G Cloud
Email is the quickest and easiest way to communicate with business partners. However, without ... powered by Postini, Policy-enforced TLS (Transport Layer Security) service offers your organization ... to specific customer needs, including the.

georeferencing of tls data for industrial indoor complex ...
Current Terrestrial Laser Scanners (TLS) allow fast acquisitions of many dense point clouds. This technology is widely used within industrial complex scenes.

TLS-Tools 2003- Layout.qxd
and use such tools creatively to spur better business decisions. Improved decisions .... Develop effective measures and meaningful standards, establishing both ...

GB TLS Spreaders-lifters.pdf
2-stage handpump. • hose, 1.8 ... 700. 700. Combined. pump. single-acting. single-acting. single-acting. A. mm. 5. 5. 8. B ... GB TLS Spreaders-lifters.pdf. GB TLS ...

SSL & TLS Essentials. Securing the Web.pdf
Page 3 of 212. Publisher: Robert Ipsen. Editor: Marjorie Spencer. Assistant Editor: Margaret Hendrey. Text Design & Composition: Stephen Thomas. Designations used by companies to distinguish their products are often claimed as. trademarks. In all ins

Handling Branches in TLS Systems with Multi-Path ...
Figure 2. Normalized speedup with varying misprediction rate for sequential execution and for TLS systems with 2,. 4, and 8 cores. Speedups are normalized to ...

Achieving Identity-based Encryption Enabled SSL/TLS and Its ...
retrieving files using HTTP, HTTPs, and FTP, the most widely-used Internet protocols ... In this paper, although a high speed implementation is outside the scope, ... public key certificate, and so cutting the cost of a public key certificate is a ..

Significant Takeaways for Presentations from TLS ... - Automotive Digest
Big Picture Observations & Trend-Spotting from the 2017 TLS Summit. ▫ There was no ... sales process http://www.relevateauto.com/relevateauto-grahamline/ ...

POSH: A TLS Compiler that Exploits Program Structure
piler infrastructure. We perform our transformations in the tree SSA high-level intermediate representation [11]. 3.3 Profiler. The profiler provides a list of tasks ...

SSL & TLS Essentials. Securing the Web.pdf
10 9 8 7 6 5 4 3 2 1. Page 3 of 212. SSL & TLS Essentials. Securing the Web.pdf. SSL & TLS Essentials. Securing the Web.pdf. Open. Extract. Open with. Sign In.