1 PRODUCT OVERVIEW: The GlobalCerts TM Secur Gateway TM Automatic encryption and decryption is unique to the Secur Gateway. The GlobalCerts Secur Gateway is based on a network server appliance that automatically encrypts outgoing Internet whenever possible. It also decrypts incoming encrypted Internet automatically and delivers it to the existing mail infrastructure. The Secur Gateway even allows users to send encrypted to people who have nothing more sophisticated than a basic web browser. It installs with a minimum of effort and requires no software to install on user desktops or corporate mail servers. It is standards-based, using X.509 compatible public key certificates with standard formats and protocols.. GlobalCerts TM Secur Gateway TM The GlobalCerts security solution is based around a network appliance, the GlobalCerts Secur Gateway. This appliance is installed on the enterprise network and is configured to encrypt and decrypt that goes out to or comes in from the Internet. Automatic encryption and decryption is unique to the Secur Gateway. To perform its automatic encryption and decryption, a Secur Gateway manages X.509 compatible public key certificates for each user. It stores both the public key and the private key securely inside the appliance. The Gateway can be configured to always encrypt outbound , or to only encrypt it when sent by selected users. If the recipient has an X.509 certificate that is discoverable by the gateway, mail is always encrypted using the public key in that certificate. Even when the recipients have no cryptography software and no Secur Gateway of their own, they can receive secure from Secur Gateway users. Furthermore, the messages are protected by the same high-quality public key cryptography that protects normal encrypted . This is the SecureMessenger feature described on page 4.
2 There is nothing to configure on users desktops. GlobalCerts has also made the Secur Gateway as unobtrusive as possible. Users keep the same desktop software they have always used, their addresses stay the same, and they continue to use any groupware (such as Novell GroupWise, Microsoft Outlook, or Lotus Notes ) normally. The primary change they will notice is the presence of cryptography summaries at the bottom of messages, indicating whether or not the message was encrypted in transit. Figure 1: Overview of the Architecture Security Architecture A Proxy Architecture The Secur Gateway provides a variety of security services and features. It provides these features by working as a proxy between mail servers, or between external recipients and the organization. The Secur Gateway s role as a proxy gives us maximum flexibility to accommodate your needs, without disrupting your business. Standard Features: For Gateway Users Automatic Encryption: When it is configured to always encrypt, the Secur Gateway, using standard S/MIME encryption, automatically encrypts messages for all recipients who have certificates that it can discover, as well as all recipients who have a SecureMessenger template. When it encounters a recipient who has neither, it prompts the sender to create a SecureMessenger template for that recipient.
3 Our simple installation means that your organization gets a substantial new service, but your IT staff does not get a substantial new burden. Compatibility means you keep your existing infrastructure and make just enough changes to add security to it. Automatic Decryption: Encrypted is decrypted automatically as it arrives at the organization. This feature allows for maximum compatibility with existing mail servers and mail filtering systems like virus scanners and keyword-based policy systems. Transparent Operation: The Secur Gateway automatically creates users and their associated key pairs when they first send mail through the gateway. Alternatively, an administrator can designate which users will have their mail encrypted. Simple Installation: The Secur Gateway is a network appliance and is installed in the network near the mail firewall. It requires very little work to install or configure. The Secur Gateway can be installed without making a single change to a user s desktop computer. No software is needed, no settings are altered, and no addresses change. Server Compatibility: The Secur Gateway is compatible with Microsoft Exchange, Novell GroupWise, IBM Lotus Domino, and all standards-based (SMTP, POP, IMAP) mail software. The Gateway inter-operates with all components of the existing infrastructure, including advanced features like web access to , anti-virus scanning, and content filtering. If you have made an investment in PKI technology, you can choose to continue to use that technology in conjunction with the Secur Gateway. Standards Compatibility: Each Secur Gateway appliance generates X.509 v.3 compliant digital certificates for their users. However, users can replace these certificates with X.509 certificates issued by other certificate authorities, for encryption and decryption operations. Secur Gateway appliances automatically detect and harvest new certificates for future use when they are attached to incoming messages. Secur Gateway TM Sending Securely to Certificate Holders It s simple for anyone to initiate a secure message to someone else. They just type the address a little differently. All Secur Gateway appliances publish the certificates of their users in SecureTier TM, GlobalCerts global certificate management system. When a GlobalCerts Secur Gateway receives an outgoing message that is prepended with secure-, it looks for the recipient s certificate in SecureTier. If it finds it, it retrieves the certificate, validates it, and then encrypts the message using the public key contained in the certificate. If the certificate cannot be found in SecureTier, the Secur Gateway then checks its local certificateharvesting repository to see if the certificate can be found there.
4 If the recipient s certificate is found, the Gateway uses the public key in that certificate to encrypt the . Thus the Gateway can discover certificates in one of two ways. If certificates can be found for the recipient, the SecureMessenger feature is not used. Instead, the recipient gets secure mail as usual. 1. If the certificate belongs to a user of a Secur Gateway, it will be published in SecureTier, and any other Secur Gateway will automatically and transparently discover it by looking it up in SecureTier using the recipient s address; 2. If the certificate does not belong to a user of a Secur Gateway (i.e. it is not published in SecureTier) any gateway that encounters it will place it in its harvested-certificate repository. Thus when a Secur Gateway looks for a certificate, it first checks in SecureTier, and then looks for it in its local harvestedcertificate repository. SecureMessenger : Sending Securely to Everyone If the gateway is configured to send all messages securely, and the recipient doesn t have a discoverable certificate, SecureMessenger is automatically invoked. SecureMessenger is a feature integrated into the Secur Gateway, which allows users to easily and automatically encrypt messages sent to recipients that don t have a certificate, or don t have a certificate that is discoverable by the Secur Gateway. SecureMessenger makes it safe to send sensitive information by customer financial information, PHI (Personally- identifiable Health Information) records or data, confidential legal documents, etc. Now information can be sent securely to any recipient in the world, even if they have nothing more sophisticated than a basic web browser. The Secur Gateway can be configured to always send these messages securely, or to only do it when the message is prepended by secure-. Here s how it works, step-by-step, when encryption is optional: You prepend secure- to the recipient s address, or place [secure] in the Subject line. For example, if your recipient s address were you would need to type into your To: field; 2. The Secur Gateway stores the message you re trying to send and immediately sends back to you a secure message with a URL link to your own local Secur Gateway appliance;
5 A SecureMessenger template can be reused as often as required. 3. You connect to your Secur Gateway, over an SSL-secured Web connection, in order to enter a clue and a passphrase for your recipient. They will later use that clue to determine the passphrase, allowing them to read the message. You can also request to be notified when the message is retrieved, and establish a lifetime for the message. After this lifetime has expired, the message is destroyed. Lastly, you can save these values in a template, as standard values you ll use every time you communicate with this recipient. You are then only prompted for the clue and passphrase once per recipient, when you initially create the template. After you submit this information, the Secur Gateway creates a temporary key pair, encrypts the message with the public key, and encrypts the private key with the passphrase. Figure 2: SecureMessenger 4. The Secur Gateway immediately notifies your recipient that they have a secure message waiting for them. They receive a simple message with a private Web link to a secure Web page hosted on the sender s Secur Gateway appliance; You can communicate securely with colleagues as easily as adding secure- to their address. Your recipient uses a web-mail interface, but you always use your software as usual. 5. The recipient clicks on the private Web link, establishing a secure Web connection (using SSL) to your Secur Gateway. They are prompted with the clue and asked for the passphrase; 6. When the recipient types the correct passphrase, their temporary private key is unlocked, the message is decrypted and displayed, and the recipient is easily able to download any attachments you included-all across the secure Web connection that has been initiated; 7. Your recipient can also reply to you securely: they type their reply message in the Web browser window and upload any files to be sent. Their message and all of its attachments are then encrypted and sent securely to you, the original message sender. Until the original message expires, the recipient can reply to you as many times as they would like;
6 8. You receive their reply as a secure message in your mailbox as usual. Any files they uploaded are attachments to the message. You don t have to do anything special to receive them. The SecureMessenger is easy to use, and requires minimal user training. With GlobalCerts you spend your time in familiar software. There s no special Web site for initiating or receiving these messages, and secure replies come to your regular inbox in the usual way. For increased security, SecureMessenger messages are stored at all times on your Gateway, not with any third party. Your secure information flow does not depend on any other company, and the keys that decrypt messages are stored solely within your company s trusted intranet. SecureTier DNS is fast, hierarchical and efficient. SecureTier solves the problem of finding public keys for encrypting messages. Finding Public Key Certificates Quickly and Easily Another standard feature of all Secur Gateway appliances is their connection to SecureTier, GlobalCerts global certificate management system. One of the biggest hurdles to using public keys to encrypt is the problem of discovering public key certificates for all the recipients of messages. The difficulty of finding certificates for encryption is a major obstacle to large-scale adoption of encryption systems, and GlobalCerts has created SecureTier specifically to overcome this barrier. In order to encrypt an message, a certificate must be found for every intended recipient. If the recipient does not have a certificate that can be discovered, another secure delivery mechanism, (such as SecureMessenger) must be used. SecureTier leverages DNS technology - the same fundamental Internet technology that resolves domain names into IP addresses - to provide a global public certificate discovery and retrieval system. SecureTier enables public key certificates to be found quickly and easily, based on the Internet address of the recipient. No other technology is as fast, as scalable, or as robust. Every Secur TM Gateway user certificate is published in SecureTier, significantly simplifying inter-organizational secure communications, since knowledge of an address is all that is required to discover the certificate of any Secur TM Gateway user. Any Secur Gateway can find the certificate of another Secur Gateway user via SecureTier - and then use it to encrypt their messages.
7 Because SecureTier is so fast and scalable; Secur Gateway appliances look for encryption certificates for all recipients of all messages all the time by default. This is a unique benefit that only GlobalCerts can offer. No other key distribution and discovery system is so efficient that key lookup can be performed on every message as a matter of course. Compatibility with Existing PKI Technology There are two fundamental ways in which the Secur Gateway utilizes certificates that are issued by other X.509-compliant secure systems. It can encrypt messages using public keys harvested from incoming messages that are received, and it can use key pairs generated by other X.509-compliant PKI software for its own internal users. Using Recipients Certificates Automatically If your colleagues have certificates from another PKI vendor, they need only send you a message digitally signed with their certificate. The Secur Gateway harvests the certificate when it is first received. If the certificate successfully validates, it is stored in the Secur Gateway. The next time you (or any other user of your Secur Gateway) try to send that person , the Secur Gateway automatically finds their certificate and uses it to encrypt your message. If the harvested certificate fails to validate, it is placed in a queue for administrative attention. The administrator can then inspect the certificate validation chain, and determine the appropriate action. Using A Certificate from Another CA If you have a certificate from another CA, such as Digital Signature Trust Company or Verisign, you can upload that certificate and its corresponding private key, and the Secur Gateway will use that key pair automatically. messages you send encrypted will be digitally signed with that private key, and any incoming will be encrypted using the public key contained in the matching certificate. Encrypted messages generated by the Secur Gateway are compatible with existing S/MIME standards. All X.509 certificates issued by Secur Gateway appliances are X.509 version 3 compliant, with support for extensions popular in modern browsers and software.
8 Compatibility with Existing Infrastructure This kind of compatibility sets the GlobalCerts Security Solution apart. GlobalCerts actively tests its products with many well-known software products and platforms to assure support and interoperability. GlobalCerts also complies with standards such as S/MIME, X.509, and RSA Security s PKCS series of standards. Since no software is installed on the desktop computers or mail servers, the Secur Gateway is compatible with many software products that are standardscompliant, but may not have significant market presence. The following page contains a list of major commercial software that has been formally tested with the GlobalCerts Secur Gateway. Server Software Novell GroupWise 1 Lotus Notes Microsoft Exchange UNIX send mail SMTP-based mail servers UW IMAP and POP servers Client Software Novell GroupWise Lotus Notes Netscape Microsoft Outlook Microsoft Outlook Express Eudora SecureMessenger has been tested with Netscape, Internet Explorer, the AOL web browser, the EarthLink web browser, and several text-only web browsers (such as those used by the visually impaired). Implementing Security This is the baseline configuration. There are a variety of options available to meet special needs, but this covers the essentials. Inbound mail passes through the Secur Gateway first. The GlobalCerts Secur Gateway thoroughly protects your organization s messaging. It requires very little, if any, reconfiguration of your environment. Inbound The Secur Gateway must be the inbound mail exchanger (MX) for the organization. This means that when comes in from the outside world, it will pass through the Secur Gateway before being delivered to any other servers. This allows the Secur Gateway to provide seamless, automatic decryption of encrypted . If your organization uses a virus scanner or other mail filter software, the Secur Gateway can send the decrypted mail to that system for filtering and scanning..
9 Figure 3: Inbound Mail Flow The Secur Gateway is compatible with virus scanners and all other mail filtering software. Outbound mail passes through the Secur Gateway last. If your organization uses any kind of mail filtering software, such as an anti-virus scanner or mail archiving server, it will continue to operate normally. Messages are decrypted prior to being scanned. No other approach to automatic encryption exists that can so easily accommodate virus scanners and mail filtering systems. Outbound The Secur Gateway must be the last stop for outbound to the Internet. This means that if you already have an server (such as Lotus Domino or Microsoft Exchange), you must direct it to send all outbound to the Gateway for final delivery to the Internet. The messages, not yet encrypted, can be protected by SSL communications as they travel between your existing mail server and the Secur Gateway. After the Secur Gateway performs encryption operations, the messages are released to the Internet using SMTP as usual. Figure 4: Outbound Mail Flow Many companies employ an outbound mail scanner that enforces company policy, performs content filtering, scans for viruses, or perhaps archives all outbound messages. Secur Gateways are compatible with all such systems since Secur Gateways are involved only at the very last stage, when mail has been processed and is approved for release to the Internet.
10 On the Network The Secur Gateway requires few local network accommodations. It needs DNS names, IP addresses and the ability to accept certain connections through the firewall. These firewall requirements are detailed in a separate checklist available from your GlobalCerts sales representative. Managing the Secur Gateway TM Secur Gateway appliances are managed through a secure Web interface. Using a web browser, a user ID, and a passphrase, an administrator can manage all the functions of a Secur Gateway: users, their certificates, and the appliance itself. Accounts can be managed individually or in bulk, and various options can be modified and customized to make your Secur Gateway enforce the policies and presentation style of your organization. Figure 5: Web-based Administration Advanced Options GlobalCerts can provide hot spares so that encrypted is always available. Redundancy Because is a mission-critical communications service, GlobalCerts can provide redundant hot spare Secur Gateway appliances to make sure encrypted is always available. One Secur Gateway is active as a master at all times and is providing encryption services. The other is actively in contact with the master, ready to take over its duties in the event that it should fail.
11 Summary It s easy, it s safe, and it works seamlessly with your existing systems. The GlobalCerts Secur Gateway protects corporate when it is most vulnerable outside the corporate intranet. It is designed to minimize the disruption of existing workflow and mail infrastructure and protect as many messages as possible, with strong, military grade encryption. Importantly, the integrated SecureMessenger feature, allows secure messages to reach every recipient in the world through a simple Web-based interface. SecureTier provides scalable distribution of certificates and the fastest discovery of certificates for encryption. Because the risks are too great to your business, and confidential communications can t be privately conducted using unencrypted , the GlobalCerts Secur Gateway offers a cost-effective and complete solution to protect your as it travels across the Internet. Features Encryption and decryption performed in the Gateway Support for both S/MIME and SSL links Transparent operation and key management Compatible with standard clients Each user is provided with a separate x.509 certificate Can be deployed with content triggered encryption Utilizes SecureTier TM Certificate Management Infrastructure Benefits Enables anti-virus and content filtering functions near the firewall Communicates securely with virtually anyone No user or administrator actions required No software to load on each user workstation Allows for end user digital signatures Failsafe mechanism for unsophisticated users Provides inter-organizational communication capability 100 South Street West Charlottesville,Virginia (Toll Free)
April 2005 PGP White Paper PGP Universal 2.0 Technical Overview 1 Table of Contents EXECUTIVE SUMMARY... 2 INTRODUCTION... 3 THE PGP ECOSYSTEM... 4 WHAT IS THE PGP ECOSYSTEM?... 4 PGP Global Directory...
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
FTA Computer Security Workshop Secure Email March 8, 2007 Stan Wiechert, KDOR IS Security Officer Outline of Presentation The Risks associated with Email Business Constraints Secure Email Features Some
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
FortiMail Identity Based Encryption A Business Enabler WHITE PAPER FORTINET FortiMail Identity Based Encryption - A Business Enabler PAGE 2 Contents Business Need Secure Mail Delivery... 3 Challenges with
PaperClip em 4 11/19/2007 Serial Deployment Quick Start Guide This checklist should be completed before installing the em4 Relay. Your answers with the associated screens will enable you to install and
Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
tips A quick and easy guide to securing your private information tips A quick and easy guide to securing your private information Basic Information 1. How to install SecureZIP for Windows Desktop for individual
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
Kopano product strategy & roadmap 11 January 2016 INTRODUCING KOPANO For many years Zarafa has provided software solutions for organising the lives of busy professionals. Emailing and advanced calendaring
A Directory-driven Approach to Email Security: Using Directory Information to Optimize the Enterprise Email Infrastructure. Directory and DirSync May 2007 INTRODUCTION The most common security threat to
A New Standard in Encrypted Email A discussion on push, pull and transparent delivery By ZixCorp November 2010 2 Email enhances our daily business life. It enables efficient, real-time communication, unites
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: email@example.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Services ZixCorp provides easy-to-use email encryption services for privacy and regulatory compliance. As the largest email encryption services provider, ZixCorp protects tens of millions of members in
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Outlook XP Email Only Table of Contents OUTLOOK XP EMAIL 5 HOW EMAIL WORKS: 5 POP AND SMTP: 5 TO SET UP THE POP AND SMTP ADDRESSES: 6 TO SET THE DELIVERY PROPERTY: 8 STARTING OUTLOOK: 10 THE OUTLOOK BAR:
Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
iphone in Business How-To Setup Guide for Users iphone 3G is ready for business. It supports Microsoft Exchange ActiveSync, delivering push email, calendars, and contacts. And it gives mobile users secure
Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) This document provides an installation and configuration guide for MDaemon Messaging Server along with
Secure Messaging CU IT-Security noventum consulting GmbH Which kind of solution is the best for you? LKBQ EFKD FPPR OBKL QEFK DFPP ROBY RQKL QEFK DFPK LQXI TXVP PROB. Joachim Ringelnatz Agenda Background
Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses
E-Mail Management Solutions Spamfinder MailDepot MailSealer 100% spam protection for your business Compliant, permanent e-mail archiving digital signature and e-mail encryption Spamfinder Anti-spam and
Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.
1 Cyber Warnings E-Magazine August 2015 Edition End-to-End Encryption for Emails. An Organizational Approach by Dr Burkhard Wiegel, Founder and CEO, Zertificon Solutions The threat to electronic enterprise
Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices Technical White Paper April 2014 DDL Systems, Inc. PO Box 1262 Valparaiso, IN 46384 Phone: 866 559-0800 Introduction
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Secure File Delivery White Paper Matthew Covington & Garth Robbins 07/15/2010 2010, Smith Micro Software, Inc. The Challenge Simply put, email was not designed for file delivery, and its limitations make
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Hosted Email Managed by Email Specialists The Mailtrust email system is the premium hosted email platform that provides your business with powerful, secure, and reliable email with absolutely no maintenance
PREMIUM MAIL USER GUIDE WHO THIS USER GUIDE IS FOR This document is for users of BigPond Premium Mail. It describes the features of BigPond Premium Mail from a user s perspective. It contains: A general
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Personalised E-Mail package Details All Mail Packages provided include a UK Domain name of your choice when available (firstname.lastname@example.org), the domain name will be registered in your name and
P a g e 1 Steadfast email Steadfast email delivers Exchange-level mail server features at a lower cost. With lower end user requirements, superior stability, and reduced maintenance costs Steadfast email
TM CallPilot. Release 2.0 My CallPilot User Guide Contents Welcome to My CallPilot................................3 Getting started........................................4 Logging in...........................................5
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
Secured Mail through PGP Mail Gateway L. S. Haturusinha, Y. Y. Landersz, A. U. H. Gamage, P. N. Pathiranage, G. T. D. Rodrigo, and M. P. A. W. Gamage Abstract PGP Mail Gateway is a backend server which
Email Encryption When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption Technical Brief WatchGuard Technologies, Inc. Need for Email Encryption Is at Its Peak Based
USING OUTLOOK WITH ENTERGROUP In this tutorial you will learn how to use Outlook with your EnterGroup account. You will learn how to setup an IMAP or POP account, and also how to move your emails and contacts
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
Version 1.7 Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide Last updated October 2011 1 Introduction and Overview... 1 2 The Case for Email monitoring... 2 3 Installation
Feature Comparison Guide Stay Secure Portal Autumn 2015 Contents Introduction... 3 Description on some of the new features... 5 Customer overview from partner portal... 5 Partner & customer portal linkage...
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
GFI Product Manual Administration and Configuration Manual http://www.gfi.com email@example.com The information and content in this document is provided for informational purposes only and is provided "as is"
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Copyright (C) 2012 MessageSolution Inc. All Rights Reserved Table of Contents Chapter 1: Introduction... 3 1.1 About MessageSolution
Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces
OPS Data Quick Start Guide OPS Data Features Guide Revision: October, 2014 Technical Support (24/7) - (334) 705-1605 http://www.opelikapower.com Quick Start Guide OPS Data: Beginning today, you have access
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
WHITE PAPER Addressing E-mail Archiving and Discovery with Microsoft Exchange Server 2010 Introduction With businesses generating and sharing an ever-increasing volume of information through e-mail, the
GFI White Paper: GFI FaxMaker and HIPAA compliance This document outlines the requirements of HIPAA in terms of faxing protected health information and how GFI Software s GFI FaxMaker, an easy-to-use fax
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Exchange (UCMAIL) Configuration Procedures Last Updated: 09/04/2008 by Jon Adams, UCit Email Services Table of Contents New Features for Exchange 2007... 2 Supported Mail Clients... 3 Unsupported or Incompatible
Protecting Data-at-Rest with SecureZIP for DLP TABLE OF CONTENTS INTRODUCTION 3 PROTECTING DATA WITH DLP 3 FINDING INDIVIDUAL AND SHARED INFORMATION-AT-REST 4 METHODS FOR REMEDIATION 4 ENCRYPTING UNPROTECTED