Secured Global Communication version 4.6

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Secured email Global Communication version 4.6"

Transcription

1 Secured Global Communication version 4.6 A new and improved way to receive Secured Authors: Daniel Nilsson and Jeff Sherwood May 11, 2010

2 Content Introduction...3 Secured Sending Secured s - user perspective...4 Establishment of a secured channel identification of the receiver...4 Receiving a Secured with Global Communication technology user perspective.5 Additional ways to receive Secured s user perspective...8 Centrally managed templates education is the key...9 Endpoint to endpoint security...10 Technical requirements for Global Communication...10 Additional features in version 4.7 released fall Summary

3 Introduction This technical paper is intended to provide an overview of Cryptzone s planned release of Secured version 4.6 with new features based upon Cryptzone s exciting new technology called Global Communication. Secured v4.6 planned released date is June of 2010 and will be delivered as a product extension of the SEP platform focused on outbound communication compliance. This technical paper will explain for the first time, details of this exciting new technology and the impact upon Cryptzone s security suite of encryption technology. To learn more about Cryptzone s security solutions, please visit the Cryptzone Resource Center at Technical White Papers, pre-recorded webinars and video casts are available for viewing and download. 3

4 Secured is the most common method of communications for businesses today and is used daily to transmit sensitive or confidential information - including customer information, employee records, customer lists, operational data, trade secrets, and legal documents. Cryptzone s Secured is our award winning security software application that provides powerful end-to-end, easy to use encryption to ensure regulatory compliance and protect your organization sensitive data. Figure 1 The Send secured button When Secured is installed the user will get a new button for their Outlook, Send secured. This will enable the user to send secured s. Sending secured s - user perspective From a user perspective, sending a secured is done by simply clicking a Send secured button integrated within Microsoft Outlook or Lotus Notes. When a user clicks the Send Secured button the will become encrypted, wrapped and sent. Wrapping of an refers to Cryptzone s concept of delivering secure messages where the actual secured content is delivered as an attachment in an ordinary MIME . This is also referred to as wrap-mail. The wrap-mail is a communication tool used by the sender to educate the recipient of the encrypted information as to what they need to do to be able to read the secured . The enterprise solution provides the ability to customize the wrap-mail to communicate special instructions to the recipient of the encrypted . The goal of the wrap-mail is to establish a simple and easy method of communications between the sender and recipient for the first time and to use that frame work for all future communications. The optional Secured econtrol application delivers Data Leak Prevention (DLP) beyond encryption by scanning all content in the body of an , subject line and all attachments. Deployed on the client, you can monitor and control the type of information based upon security policy. Secured econtrol comes packed with ready-made policies for laws and regulations such as HIPAA HITECH Act, FTC s Red Flag Rule, SOX, GLB Act, EU Data Protection Act, privacy rules and others making it easy for customers worldwide to deploy a solution to guarantee data loss prevention and offer automatic encryption. When Secured econtrol is installed and integrated with the Secured application, security policies can be applied to enforce a policy which whenever a user clicks the send button in his mail client, so you don t have to rely on them pressing the Send Secured button. The Secured econtrol policies are highly customizable to control the outcome of communication. For example, security policies can be configured to react to recipient addresses, or to the very content of the itself providing automatic encryption of an that has sensitive information within the body, subject line and/or attachments, such as social security numbers, credit card information and other items of sensitive information. Establishment of a secured channel identification of the receiver A secured channel is a term that represents a secured tunnel of communication between a sender and recipient. The channel is created with the use of a shared secret and the relationship of the known identity of the sender and the receiver. The identities used are the addresses of the sender and the receiver. The shared secret is an authentication tool to verify that only the correct recipient can read the secured , and is established by the sender to create a secured channel between two parties. This is also called end to end encryption communications, which is mandated by a number of laws and regulations. The shared secret can be provided to the application in two ways; manually by the user, or automatically with the use of an Enterprise Server. The shared secret can be provided in two ways; manually by the user, or automatically with the use of an Enterprise Server. In the first example, the user is prompted to create a custom shared secret. The bit-strength of the shared secret created by the user can be controlled with the use of password policies. These policies control the number of characters in the shared secret or shall we say password, as well as the kind of characters that should be used. In the second scenario, the client will retrieve the shared secret from the Enterprise Server. If the Enterprise Server cannot deliver a stored shared secret, the user will be prompted to create the secret himself. 4

5 Once the secured channel has been established, the client application maintains the trusted relationship. This means that once a secured channel has been established, there will be no need to create or use a shared secret again for any and all communications. The next will be sent securely through the secured channel without needing a password forever. During the process of sending a secured , the sender has the option to provide a custom unencrypted message that gets embedded with the wrap-mail. The unencrypted message is a valuable option for communicating per-message information in a plain form, readable by the recipient. Once an has been created and sent to an external recipient, the sender is responsible for exchanging the shared secret with the receiver. The exchange of the shared secret need only be done once and will be verified by the receiver. When the verification is done, the sender and the receiver can continue to send secured s to each other forever without being asked for any new, shared secrets. It is possible to set up a policy so the receiver will have to verify again every month if required or on a continuous basis. This is rare because, most users want to limit the use of passwords and receive the benefit of automatic authentication and key management. Methods of communicating the shared secret include faxprintouts, drafts or verbally. The shared secret can be a combination of information that is known by both parties. For example, a shared secret may be a customer number, the last four digits of their social security number, initials plus last four digits of the social security number - anything that the recipient would know without forgetting. There is a multitude of agreed-upon shared secrets that provide a high level of security and can be easily remembered by the sender and recipient. Methods of communicating the shared secret include fax-printouts, -drafts or verbally. As for inbound communication, the server will handle all key-exchanges. If the sender forgets the shared secret or needs to view it again, it is possible to view it in the Secured Settings. It is our belief that sending a secured is an end-point to end-point process, which can be done without the use and cost of a gateway. The Secured and Secured econtrol applications can be used online, or in an offline environment when they behave as if they are still connected to the Internet. When a user sends an when offline, the user will see the secured become encrypted and end up in his outbox at the time of sending the . When the user connects to the Internet, the will be automatically sent from the outbox and moved to the sent folder. One key differentiator of the Secured application is that the recipient can access the secured content from any service. Secured s secured content is sent using the MIME layer as an attachment to the wrap-mail, which allows the user to access their s from anywhere, including public mail-services such as Gmail, Hotmail etc. Required components when sending secured s are Outlook or Lotus Notes in conjunction with the Secured Client, which is a Windows application. Receiving a secured with Global Communication technology user perspective The recipient of an encrypted will first see the delivery of the wrap-mail, which is a notification to the recipient that they have received an encrypted and special instructions on how to read it. In the content of the wrap-mail there is a direct link to a webpage that serves as a portal for accessing the secured content directly. 5

6 Figure 2 This is an example of a secured . All the receiver has to do is to click on the link to open the secured . Receivers that are internal (employed by the same organization as the sender) only need to double click on the to open it up inside their Outlook or Lotus Notes client. This portal is hosted by the senders company and can be customized to fit the organizations needs. The receiver will be able to authenticate using the shared secret that is communicated by the sender. This method is very secure because the service is being hosted sender s IT department. Figure 3 This is an example of a portal. When the receiver clicks the link in the wrap-mail the default web browser will open up and display the portal. The receiver will now type the shared secret communicated by the sender and click continue to open up the secured

7 Figure 4 This is an example of an opened secured . When the recipient enters the shared secret in the portal and clicks Continue the content of the secured will be displayed in clear text. It is possible for the receiver to open and download any attachment. The receiver can download the in.msg or PDF format. If the receiver presses the reply button the default client will start up and the receiver can reply back to the . It is important to note, when using Cryptzone s Global Communication technology, a receiver will be able to open any type of secured s from any type of platform. Now the receiver can view a secured on PC, Mac, iphone, ipad, Symbian phones, and many other types of devices. All the receiver has to do it have access to the Internet and a web browser. This means that it will be possible to send secured to any receiver without considering what platform the receiver may receive the secured at. Figure 5 This is an example of how a recipient authenticate on an iphone. The receiver simply clicks on the link in the . The iphone Safari web browser will open and display the message shown in the picture. The receiver enters the shared secret and press Continue. 7

8 Figure 6 When the receiver has authenticated, the will be displayed. Additional ways to receive secured s user perspective If the Global Communication is not used or activated there is additional ways to receive secured s using a full version Reader and Reader Lite. The recipient of an encrypted will first see the delivery of the wrap-mail, which is a notification to the recipient that they have received an encrypted and special instructions on how to read it. In the content of the wrap-mail, the user is given the option to download either the Full Reader application or the Reader Lite. The user must have administrative rights for their computer in order to install the Full Reader application. For users that don t have administrative rights, the Reader Lite application is a perfect solution. Note that JAVA is required on the recipient s computer. When the full version Reader is installed in Outlook and Lotus Notes environments, the user will simply double click the to open it. The reading pane will display the content of the wrapmail. When using other mail-clients in conjunction with the Secured client, users simply need to click on the attachment above the wrap-mail message to see the secured content. The will then be displayed as created by the sender within the local-machine webbrowser. 8

9 Figure 7 Cryptzone standard wrap-mail the Cryptzone Enterprise solution is delivered with several well tested templates for wrap-mails (instructions for the receiver). The example shows different instructions for internal and external receivers. Figure 7 Once the Reader software is installed, and the user wants to open a secured , the content has to be decrypted with the key used at the time of encryption. The instructions within the wrap-mail provide a way to communicate the method to retrieve the shared secret used. Our customers have chosen a number of ways to communicate the shared secret to the recipient of an encrypted , such as profile-driven forums or by fax, postal mail or verbally. In most enterprise installations the key is retrieved automatically and seamlessly from the Enterprise server. Once a secured channel has been established, the client software maintains the secured channel and it will never needed again forever. The next time an is received from the sender, the encrypted is automatically opened without needing to authenticate or input the shared secret or password. The software stores the shared secret locally. The client software, if used in conjunction with Outlook or Lotus Notes, allows the recipient to reply securely to the sender without needing a software license. The recipient simply clicks reply and then clicks Send Secured. Required components when opening a secured are any mail-client together with the Secured Client or Reader Lite (Java web-start application that in turn requires Java 1.4). Centrally managed templates education is the key Educating users about the importance of new security applications and how to use them can be a problem. When deploying Secured , it is necessary to train the sender to educate the recipient. The success of any encryption solution is dependent on training senders and receivers in a way that makes it easy to exchange secured s. Secured supports this with a template designer. Templates include ready-made instructions for the sender to send to the receiver instructions on how to open the secure as well as templates for the shared secret communication. The template designer allows the administrator to edit and manage templates centrally. Editing includes text and pictures as well as automatic texts. Templates can be created and deployed for large groups of senders, and customized for specific individual users. The Secured Enterprise solution includes pre-defined best practice templates that can be used and modified to fit the current implementation and the need of the organization. 9

10 Figure 8 SEP Template Designer With the template designer it is possible for the administrator to customize messages to educate users. Figure 8 Endpoint to endpoint security The Secured solution creates a secure channel or tunnel for s from the sending computer to the receiving computer. Wherever and however s are sent between the two parties, the will be stored encrypted and secured. The will be stored secured at the receiver s mail server and client, as well as the sender s mail server and client. The secured will also be stored secured in archiving systems used by the sender and the receiver. There is also an option to store unencrypted copies of the for distribution to the archival system. For a higher level of security it is possible for the administrator to activate a local security feature where the end user will be required to authenticate to the Secured system to be able to open and send secured s. The local security feature includes a user password that is unique and can only be used to authenticate to the Secured system. The concept of the local security feature is to create an extra authentication that is separate from the standard authentication used in the organization. Technical requirements for Global Communication To be able to use and activate the Global Communication solution where receivers of secured s simply clicks a link to open the secured , there are several steps required to support the application. See below for instructions to support Global Communications: 1. Activate the SEP server for external communication Secured s received are decrypted and displayed with help of the SEP Server. To activate the SEP server to accept external access please read the manual how to set up the SEP server for external access. r_sep_enterprise_for_external_access.pdf 2. Exchange 2003, Exchange 2007 or Exchange 2010 To be able to activate the Global Communication you must have Exchange 2003 or later. 3. Create a mailbox on the Exchange server that will be used to host secured s for access from the outside. The SEP Server needs to be configured to have access to this mailbox. 4. Every secured sent by the clients will be copied into this mailbox and will be stored for a predetermined period of days, after which they will be deleted. When a mail is deleted, the external user will not be able to access the s, though the Secured can still be view by other methods indicated previously. (Reader, Reader Lite). 10

11 Additional features in version 4.7 released fall 2010 In the fall 2010, version 4.7 will be released containing additional features for the Global Communication technology. The most important features with this release will be the ability to reply securely from any location - regardless of the type of platform and a new method delivery of the shared secret for authentication. We at Cryptzone believe our customers will demand the ability for recipients have the capability to reply back whereas the recipient would want to start up a secure and safe communication with receivers where s can be sent securely back and forward. This means that organizations can easily communicate sensitive information with customers and partners. In the current version of Secured a receiver is verified using a shared secret/password created and communicated by the sender. This is a very secure method but for some organizations it may feel too secure and complicated. The solution is to create a more seamless way to authenticate the receiver. In version 4.7 an alternative way will be introduced to verify the receiver, a sign up process. The sign up process works like the following: The sender creates a new to a recipient and the receiver has never received a secured before. The sender clicks the send secured button and the will be sent securely to a receiver at once. The receiver receives the secure and clicks on a web link to open it. Since this is the first time the receiver receives a secured from the sender the receiver is asked to verify his and then create a password. The receiver clicks a Continue button and will then be informed that a verification will be sent out. To verify the registration the receiver must click on a link in the verification . The receiver gets the verification and clicks the link. The secured will now be displayed for the receiver. The sign up process is the same process used to sign up for services like Gmail, Hotmail and Facebook and is familiar for most internet users. 11

12 Summary Cryptzone s approach is to create a solution that fits any size of company. The basis of Secured is that the application creates an end-to-end, virtual channel between the sender and the receiver. It doesn t matter how the recipient receives their Outlook, Microsoft OWA, Gmail, Yahoo, Thunderbird, Mac, iphone, ipad, Symbian phones, etc The Secured solution provides a way that will de-encrypt secured s, simply and easily. The most important aspect of Secured is that our technology helps our customers to meet worldwide regulatory compliance of sensitive information laws including HIPAA Hitech Act, Sarbanes Oxley, HIPAA, Payment Card Industry DSS standards, the EU Data Protection Directive and GBL Act. We use the strongest encryption method AES as well as System SKG, which generates a dynamic one time encryption key for every sent. Equally important is the fact that the key is not sent over the open Internet, therefore it is impossible to break the encryption technology. It is impossible for somebody to hack your s when they are secured. All the sender has to do is press a button send secured and everything else is taken care of. 12

Cryptzone Group AB (publ) The Simple Encryption Platform An Overview. Created 2011 For technical questions email support@cryptzone.

Cryptzone Group AB (publ) The Simple Encryption Platform An Overview. Created 2011 For technical questions email support@cryptzone. Cryptzone Group AB (publ) The Simple Encryption Platform An Overview Created 2011 For technical questions email support@cryptzone.com Agenda... Simple Encryption Platform (SEP) An introduction Product

More information

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6 MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack

More information

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee. Email Encryption User Guide Sterne Agee is committed to the security of your information. We have implemented Cisco Email Encryption to secure email communication so that only you can open it.* Questions?

More information

Bank of Hawaii Protecting Confidential Email. What's in this User Guide

Bank of Hawaii Protecting Confidential Email. What's in this User Guide 1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, or financial information. By default emails are sent

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

FortiMail Identity Based Encryption A Business Enabler WHITE PAPER

FortiMail Identity Based Encryption A Business Enabler WHITE PAPER FortiMail Identity Based Encryption A Business Enabler WHITE PAPER FORTINET FortiMail Identity Based Encryption - A Business Enabler PAGE 2 Contents Business Need Secure Mail Delivery... 3 Challenges with

More information

Djigzo email encryption. Djigzo white paper

Djigzo email encryption. Djigzo white paper Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

Barracuda User Guide. Managing your Spam Quarantine

Barracuda User Guide. Managing your Spam Quarantine Managing your Spam Quarantine Barracuda User Guide Step1: Open your internet browser and go to http://myspam.datatechhosting.com this will automatically redirect you to Barracuda s email security service

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Secure E-Mail Management Guide. June 2008

Secure E-Mail Management Guide. June 2008 Secure E-Mail Management Guide June 2008 What are Paychex Secure Messages? To enhance the security of client and vendor data, Paychex created the Paychex Secure E-mail Message Center, a Web site hosted

More information

Securemail User Guide

Securemail User Guide Securemail User Guide Created: 2009-02-17 Updated: 2013-07-05 - New links and Address Book instructions Updated: 2014-04-23 - http://dhhs.ne.gov/documents/dhhs-securemail-userguide.pdf 1 INDEX: How Securemail

More information

Your email is one of your most valuable assets. Catch mistakes before they happen. Protect your business.

Your email is one of your most valuable assets. Catch mistakes before they happen. Protect your business. Cirius Data Loss Prevention (DLP) Your email is one of your most valuable assets. Catch mistakes before they happen. Protect your business. Businesses of every size, in every industry are recognizing the

More information

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive

More information

Proactive controls to mitigate IT security risk

Proactive controls to mitigate IT security risk Proactive controls to mitigate IT security risk Policy Compliance Content Security Secure Access Endpoint Security Information security risk mitigation Empowering people to work securely The Cryptzone

More information

Email Security Solutions

Email Security Solutions TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS

More information

Secured email Enterprise eprivacy Suite

Secured email Enterprise eprivacy Suite EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

MSI Secure Mail Tutorial. Table of Contents

MSI Secure Mail Tutorial. Table of Contents Posted 1/12/12 Table of Contents 1 - INTRODUCTION... 1-1 INTRODUCTION... 1-1 Summary... 1-1 Why Secure Mail?... 1-1 Which Emails Must Be Encrypted?... 1-2 Receiving Email from MSI... 1-2 Sending Email

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...

More information

White paper. Why Encrypt? Securing email without compromising communications

White paper. Why Encrypt? Securing email without compromising communications White paper Why Encrypt? Securing email without compromising communications Why Encrypt? There s an old saying that a ship is safe in the harbour, but that s not what ships are for. The same can be said

More information

Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Gateway. Administration Guide Policy Based Encryption Gateway Administration Guide Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control...

More information

Email Encryption. Instructions for sending and retrieving an encrypted email:

Email Encryption. Instructions for sending and retrieving an encrypted email: (Effective 9/11/15) Email Encryption Instructions for sending and retrieving an encrypted email: PRIMARY METHOD to encrypt messages: Email encryption is used by specifying subject line tags. [secure] {secure}

More information

FDIC Secure Email Procedures for External Users April 23, 2010

FDIC Secure Email Procedures for External Users April 23, 2010 FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving

More information

Secure Mail Message Retrieval Instructions

Secure Mail Message Retrieval Instructions 2015 Secure Mail Message Retrieval Instructions IT Security University Medical Center 1/26/2015 Table of Contents INTRODUCTION... 3 REGISTRATION MESSAGES... 3 RETRIEVING THE SECURE EMAIL... 4 SECURE MESSAGE...

More information

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com Frequently Asked Questions 2013 SSLPost Page 1 of 31 support@sslpost.com Table of Contents 1 What is SSLPost Cloud? 3 2 Why do I need SSLPost Cloud? 4 3 What do I need to use SSLPost Cloud? 5 4 Which Internet

More information

Manually store e-mail & documents in

Manually store e-mail & documents in SuperOffice AS How to: Manually store e-mail & documents in SuperOffice (for Mac users) Index Introduction... 3 Saving a document into SuperOffice... 3 Editing a document in SuperOffice... 4 Save e-mail

More information

Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Gateway. Administration Guide Policy Based Encryption Gateway Administration Guide Document Revision Date: Sept. 11, 2012 Policy Based Encryption Gateway Admin Guide i Contents Description of Policy Based Encryption... 1 Policy Based

More information

Tumbleweed MailGate Secure Messenger

Tumbleweed MailGate Secure Messenger EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Tumbleweed MailGate Secure Messenger JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS MailGate Secure Messenger Tumbleweed

More information

Cloud Services. Cloud Control Panel. Admin Guide

Cloud Services. Cloud Control Panel. Admin Guide Cloud Services Cloud Control Panel Admin Guide 10/18/2014 CONTENTS Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control... 2 Features Summary... 3 Creating an Encryption

More information

Remember, this is not specific to your email address alone... the METHOD you retrieve your email is equally important.

Remember, this is not specific to your email address alone... the METHOD you retrieve your email is equally important. Securing Your Email Skip to Page 2 to Begin or Read this FYI Using Security Certificates: Background and FYI Securing email requires the use of a certificate in order to work. Once you sign up for a certificate

More information

DBF Secure E-Mail Procedures

DBF Secure E-Mail Procedures Department of Banking and Finance (DBF) Secure Message Center DBF Secure E-Mail Procedures This document contains information proprietary to the Georgia Department of Banking and Finance and shall not

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

Introduction to Email. Jan 24 th 2010

Introduction to Email. Jan 24 th 2010 Introduction to Email Jan 24 th 2010 Email Need special software (called email-reader or emailclient) to connect to the email-server and download the emails Email-server has limited space for each user

More information

6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?...

6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?... FAQ FOR S/MIME 1. What is S/MIME?...2 2. What is digital certificate?...2 3. What is an encrypted email?...2 4. Is it mandatory to use this service?...2 5. What I need to do to start using S/MIME service?...2

More information

Welcome to Enterprise Vault Archiving

Welcome to Enterprise Vault Archiving Welcome to Enterprise Vault Archiving You have now been told when your Outlook mailbox will be enabled for Enterprise Vault archiving. This means that instead of storing all your messages on the Exchange

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

Archive Attender Version 3.5

Archive Attender Version 3.5 Archive Attender Version 3.5 End User Quick Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com End User Quick Guide Table of Contents What is Archive Attender?... 3 How it Works... 3 What happens

More information

Email User Guide. Contents. Information Systems and Technology Dawson College v 1.3, 15 November 2013

Email User Guide. Contents. Information Systems and Technology Dawson College v 1.3, 15 November 2013 Information Systems and Technology Dawson College v 1.3, 15 November 2013 Contents 1 Overview... 2 2 Access... 2 2.1 Outlook... 2 2.2 Outlook Web Access (OWA)... 3 2.3 Outlook for Mac... 4 2.4 Other email

More information

About (EAS) Archived Email Service

About (EAS) Archived Email Service About (EAS) Archived Email Service Information Services is implementing an email archiving on the staff email system in order to save space on the main email system which is reaching full capacity. Emails

More information

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic. OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

bank zweiplus email Gateway user manual

bank zweiplus email Gateway user manual bank zweiplus email Gateway user manual T +41 (0)58 059 22 22, F +41 (0)58 059 22 44, www.bankzweiplus.ch 1/29 Table of contents 1 Foreword... 3 2 Important Notes... 3 2.1 General... 3 2.2 Password...

More information

Guidance for using the East Sussex County Council Secure Email system

Guidance for using the East Sussex County Council Secure Email system Guidance for using the East Sussex County Council Secure Email system ESCC February 2010 Using the ESCC SecureMail system The ESCC SecureMail system is an email system that provides a high level of security

More information

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:

More information

mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from

mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Technical Overview mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Contents What is mkryptor? 1 Mkryptor VS

More information

U.S. Bank Secure Mail

U.S. Bank Secure Mail U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email

More information

U.S. Bank Secure Email Quick Start Guide

U.S. Bank Secure Email Quick Start Guide Welcome to U.S. Bank s Secure Email Service! US Bank has partnered with Cisco to leverage their secure email solution, Cisco Registered Envelope Service (CRES). This guide will show you the steps for opening

More information

Guidance for sending and receiving an encrypted NHSmail e-mail

Guidance for sending and receiving an encrypted NHSmail e-mail Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted

More information

Welcome to Websense Email Archive Quick Start Guide

Welcome to Websense Email Archive Quick Start Guide Welcome to Websense Email Archive Quick Start Guide Nearly nine out of ten Internet users spend seven hours a week managing email. Yet, studies show that 95% of the email sitting in our inboxes will never

More information

Recalling A Sent Message in Outlook 2010

Recalling A Sent Message in Outlook 2010 Recall or replace an email message that you sent The recall feature in Microsoft Outlook tries to stop delivery and, optionally, replace an email message that you have already sent to another Microsoft

More information

Word Secure Messaging User Guide. Version 3.0

Word Secure Messaging User Guide. Version 3.0 Word Secure Messaging User Guide Version 3.0 Copyright 2007-2013 WordSecure, LLC. All Rights Reserved. Page 1 of 7 1. Introduction Word Secure Messaging is a program that allows you to exchange encrypted

More information

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook. Migrate Archived Outlook Items Outlook includes archiving functionality that is used to free up space on the mail server by moving older items from the mail server to PST files stored on your computer

More information

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents 1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone

More information

Outlook-How to Encrypt an Email 10/16/2014

Outlook-How to Encrypt an Email 10/16/2014 Section 1. How to Send an Encrypted E-mail from the Private Network/State Employee The following conditions must be true to send an encrypted e-mail using Proofpoint e-mail encryption: Your State Agency

More information

Secure Email A Guide for Users

Secure Email A Guide for Users Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT

More information

Client Training Manual

Client Training Manual Client Training Manual Contents Quick Summary on How to Open Encrypted Email from Arlington County.2 I. Overview... 4 A. Overview of Email Encryption with Arlington County Government... 4 Link to YouTube

More information

Exchange mailbox users can access their email from anywhere using the Outlook Web Access

Exchange mailbox users can access their email from anywhere using the Outlook Web Access EXCHANGE EMAIL CONFIGURATION Outlook Web Access and Outlook Anywhere Outlook Web Access Exchange mailbox users can access their email from anywhere using the Outlook Web Access (OWA) facility. This may

More information

EMAIL: How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options)

EMAIL: How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options) EMAIL: How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options) Versions: Outlook 2003 and OWA 2003 Purpose: To show how a user can setup an email message such

More information

Cryptshare for Outlook User Guide

Cryptshare for Outlook User Guide Cryptshare for Outlook User Guide V1.6.2 Befine Solutions AG Werthmannstr. 15 79098 Freiburg i. Br. Germany Web: https://www.cryptshare.com E-Mail: info@cryptshare.com Tel.: +49 761 389 13 0 Fax: +49 761

More information

Lotus Notes 8.5 to Office 365 for business

Lotus Notes 8.5 to Office 365 for business Lotus Notes 8.5 to Office 365 for business Make the switch Microsoft Outlook 2013 may look different from Lotus Notes 8.5, but you ll quickly discover that Outlook lets you do everything you re used to

More information

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

Bank of Hawaii Protecting Confidential Email

Bank of Hawaii Protecting Confidential Email 1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, or financial information. By default emails are sent

More information

SuperOffice AS. CRM Online. Set up your web mail client

SuperOffice AS. CRM Online. Set up your web mail client SuperOffice AS CRM Online Set up your web mail client Index Introduction... 3 Your preparations... 3 Setting up your web mail... 4 Using your Inbox... 7 This document is subject to change. Screenshots

More information

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal

More information

Email Compliance in 5 Steps

Email Compliance in 5 Steps Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential

More information

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V. 1/15/15 Samson V. 1. These instructions are for users who reside outside the University of Colorado Denver that receive encrypted emails from faculty or staff of UC Denver. As a part of our HIPAA compliance

More information

Email access via the Internet. Outlook Web Access

Email access via the Internet. Outlook Web Access Email access via the Internet Outlook Web Access SiX Document Title/ Search Keyword(s): Email access via the Internet Outlook Web Access Service Group: E-Learning & Information Management Contact Details:

More information

E-mail Encryption. How do I send my e-mail encryption key?

E-mail Encryption. How do I send my e-mail encryption key? E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout

More information

1. Scope of Service. 1.1 About Boxcryptor Classic

1. Scope of Service. 1.1 About Boxcryptor Classic Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic

More information

MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE

MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE Mutual of Omaha Secure Email Client/Partner User Guide April 2015 TABLE OF CONTENTS INTRODUCTION 3 About this Guide 3 CREATING A MUTUAL OF

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Online Backup Solution Features

Online Backup Solution Features CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium

More information

Ciphermail Gateway PDF Encryption Setup Guide

Ciphermail Gateway PDF Encryption Setup Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption

More information

Help Administration (top right) > User Management > Add User Delete

Help Administration (top right) > User Management > Add User Delete GoEnbox is a web-based encrypted email service for Settlement Service providers and Small Businesses. You can use GoEnbox to communicate securely with users outside your organization. Contents Topics for

More information

BlackBerry Internet Service. Version: 4.5.1. User Guide

BlackBerry Internet Service. Version: 4.5.1. User Guide BlackBerry Internet Service Version: 4.5.1 User Guide Published: 2014-05-22 SWD-20140522173857703 Contents 1 Getting started...7 About the messaging service plans for the BlackBerry Internet Service...7

More information

Send and receive encrypted e-mails

Send and receive encrypted e-mails Manual Send and receive encrypted e-mails Bank J. Safra Sarasin Ltd Document Owner Security Classification Document Type Bank J. Safra Sarasin Ltd internal and external use Manual Document change history

More information

Realfax Service User Manual Version 4

Realfax Service User Manual Version 4 Realfax Service User Manual Version 4 COMMUNICATE FROM EVERYWHERE TO EVERYWHERE Table of Contents Features and Benefits... 1 Using the Service... 2 How Realfax works... 2 Sending Faxes... 2 Receiving Faxes...

More information

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts: Let's Begin: Log In and Set Up Security Questions To start, you can log in from the ProMailSource home page. Sending an Encrypted/Unencrypted Message Every message you send through ProMailSource is automatically

More information

Pros 4 Technology Online Backup Features

Pros 4 Technology Online Backup Features Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

QTEL MOBILE EMAIL CORPORATE EDITION

QTEL MOBILE EMAIL CORPORATE EDITION QTEL MOBILE EMAIL CORPORATE EDITION Overview With Qtel Mobile Email Corporate Edition, you ve got a secure, easy mobile email solution you can deploy across your entire organization, keeping your employees

More information

Tax and Accounting Document Delivery

Tax and Accounting Document Delivery Tax and Accounting Document Delivery Encrypting PDF Files in Email Attachments: Reduce Risk, Automation and Compliance Administrative Items 90 Minutes (Education, Demo, Q&A) Participants are muted. Please

More information

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID. How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined

More information

HOW WILL I KNOW THAT I SHOULD USE THE IAS EMAIL CONTINUITY SERVICE? https://web.ias.edu/updateme/

HOW WILL I KNOW THAT I SHOULD USE THE IAS EMAIL CONTINUITY SERVICE? https://web.ias.edu/updateme/ WHEN DO I NEED TO ACCESS THE IAS EMAIL CONTINUITY SERVICE? This service is provided to address the following actions during periods where the IAS email servers are offline: 1. If you need to check for

More information

Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services

Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services Page 1 User Manual for Encrypted Email Services Instructions for Using Encrypted Email Services This document is being provided to assist you in opening encrypted emails sent from Century Bank. The following

More information

Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class

Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class A Guide for Administrators Table of Contents Requirements... 3 1. Activate & Setup Online Software

More information

Web Hosting Getting Started Guide

Web Hosting Getting Started Guide Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload

More information

Outlook Web Access Tipsheets

Outlook Web Access Tipsheets You can use a Web browser to access your Outlook mailbox from any computer with an Internet connection. You can use Outlook Web Access with Microsoft Internet Explorer, Mozilla Firefox and many other browsers.

More information

Creating a Content Group and assigning the Encrypt action to the Group.

Creating a Content Group and assigning the Encrypt action to the Group. Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Secure Email User Guide. PGP (Pretty Good Privacy)

Secure Email User Guide. PGP (Pretty Good Privacy) Secure Email User Guide PGP (Pretty Good Privacy) 1 Contents 1 Introduction... 3 2 PGP Web Messenger... 4 3 Enrolling as a PGP Web Messenger User... 4 4 How to use PGP Web Messenger... 6 4.1 Mailbox access...

More information

Setting up and controlling E-mail

Setting up and controlling E-mail Setting up and controlling E-mail Two methods Web based PC based Setting up and controlling E-mail Web based the messages are on the Internet accessed by dial-up or broadband at your Internet Service Provider

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

SVA Backup Plus Features

SVA Backup Plus Features 1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most

More information

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016 Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission

More information