Enforces compliance based on pre-defined policies and rules. Reduces human error and minimizes the risk of security breaches.
A critical piece of your company’s overall privacy strategy. Allows you to monitor email content, identify confidential information leaving your company and track where it is being distributed.
Easy to manage:
Add directly through the HostPilot® Control Panel and manage policies through the Encrypted Email management console.
Easy to use:
No additional software or plug-ins required. Send an email to any recipient.
You determine which regulations affect your business and which users you need to control. We host and manage the hardware and software to enable the encryption/decryption process and manage digital identities. We also provide a powerful web-based administration console from which you set, review and customize your organization’s privacy policies and administer users.
Jumpstart your efforts with a wide variety of commonly used rules, dictionaries, and expressions or create complex rule chains to suit your organization’s unique needs. In addition to encrypting messages, you can monitor all messages and reject those that do not comply with company policies and procedures. Our analytics tool tracks every message that’s been processed and provides summary diagrams and detailed searchable reports.
What security technology is used for encryption?
Encrypted Mail uses standard-based technology, such as Public Key Infrastructure (PKI), S/MIME, and X.509 certificates to establish confidentiality, message integrity, and user authentication.
Can I send an email to anyone?
Yes, you can send an email to anyone.
How are scanned outgoing emails managed?
Policies can be configured to encrypt and send, return to sender or delete messages with insecure content. Comprehensive reporting lets you track and monitor all outbound email activity.
How do recipients receive emails?
Recipients retrieve their messages from a secure Message Pickup Center, where they can read, reply, reply-to-all or forward encrypted messages.
Are attachments scanned?
Yes, attachments are scanned and policies are applied based on the content of the attachments.
What attachments does it support?
Encrypted Mail encrypts any MS Office document, .PDF file, image file, and almost any other popular file format.
Are emails from mobile devices encrypted?
Yes, policy-based Encrypted Email supports emails sent from BlackBerry, iPhone, Android, Windows Mobile, and Symbian mobile devices.