Email Encryption


Protecting Your Company, Customers and Partners

An important piece of the security puzzle, email encryption is critical to your business.  With an increase in regulatory pressures, identity theft, and highly publicized security breaches in the media, companies that do not encrypt emails containing sensitive information are at risk of regulatory fines, lawsuits, negative PR and a loss of company intellectual property.

Effective Email Encryption

Key Differentiators

Protect your customers and yourself by encrypting sensitive email to ensure privacy and meet regulatory compliance requirements with cost effective email encryption.  Messages are encrypted in one of three ways: predetermined encryption phrase in the subject line, personally identifiable information  in the body of  the email or simply marked as confidential. 

Secure Portal

Messages for Recipients

Anyone who receives an encrypted email will be directed to the secure message portal, where the message can be retrieved.  Once an account has been created, messages can be read and replied to. Past messages will remain available inside the secure message portal as long as they haven’t expired or been deleted.

Leverage Secure Network

Global Encription Key Repository

Eliminate the need to build your own directories of encryption keys.  Instead leverage the hosted and shared secure network directory, a global encryption key repository with almost 30 million members, and growing at over 100,000 new members per week

Control Content

Policy-Based Email Encryption

Encrypt outbound emails based on content, sender, and recipient.  Full content scanning of messages and attachments enables companies to comply with industry regulations.  Predefined lexicons automatically encrypt, reroute, or block email messages containing financial (GLBA), healthcare (HIPAA), PHI, PII and profanity content.  A sender can also trigger an email to be encrypted as well as encrypting all emails destined for specific recipient email domains and email addresses.

We are business technology experts, providing what are traditionally called IT services in a very different way.