mkryptor allows you to easily send secure s. This document will give you a technical overview of how. mkryptor is a software product from

Size: px
Start display at page:

Download "mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from"

Transcription

1 Technical Overview

2 mkryptor allows you to easily send secure s. This document will give you a technical overview of how. mkryptor is a software product from

3 Contents What is mkryptor? 1 Mkryptor VS other technologies 2 Wait, what about SMTPS / SSL / TLS? 3 Mkryptor key technologies 4 PDF with AES Encryption 5 What about attachments? 5 Other options 5 Known Facts 6 Adding Known Facts to messages 7 Special tags / facts 8 Storing / re-using Known Facts 8 Where does mkryptor sit in my infrastructure? 9 Load balancing / redundancy 10 Selective Routing 10 What about replies? 11 Can a recipient choose their own password / facts? 13 Do you offer a cloud service? 14 What branding options do I have? 15 Contact and further reading 16 Technical Overview Page i

4 What is mkryptor? As the connected world becomes ever more conscious of data security in government, industry and our homes - One area of digital life remains completely insecure and easy to hack: . In 1982, when SMTP first came in to use, Internet security and privacy was not a consideration. There have been a few attempts to solve the issue over the years, but none have had what it takes for wide-scale adoption, primarily because they were too complicated to use. Now there is mkryptor a simple to use system that makes your private private. And what s more it does it using your ordinary system and without all the fuss and technological know-how required of other such systems. mkryptor has been designed for real people with ordinary computers and average skills. Importantly, we ve come up with a solution which needs no special software at either end, meaning that you can access mkrypted s from any device desktop, laptop, tablet or smart phone. This document is a technology overview, so rather than just telling you what it does and how easy it is to use, instead we re going to concentrate on how it actually works Technical Overview Page 1 of 16

5 Mkryptor VS other technologies encryption is not a new concept, A few specialist organisations like the military, security forces, parts of government and several areas of civilian business have been using encryption software for years. The drawback with existing products however, is that they re complicated, time-consuming, and difficult to use. Let s first look at the alternatives, then we ll start to examine how mkryptor does things differently There are 2 types of encryption on the market: Type 1 PGP keys, X509 certificate public/private key pairs and/or a password have to be shared before messages can be exchanged. Often special software must be installed by both the sender and recipient. This is far beyond the capabilities and understanding of the average user. Even if used in a closed environment where all senders/recipients are known to each other, there is still a complex management overhead. Type 2 Messages are stored on a web platform. Recipients must be registered before they can view messages. When a secure message is created, the recipient gets an to tell them that a secure message is waiting for them. They then have to access the web platform and log-in to retrieve the message. This is not and it is not convenient. It is just a glorified document storage platform. Mkryptor can be considered type 3. It does away with all of this complexity. There is no exchange of keys or pre-registration required, and the message ends up in the recipient s inbox, where it is supposed to be. There are 2 key components to how mkryptor works: Known Facts; and PDF with AES Technical Overview Page 2 of 16

6 Wait, what about SMTPS / SSL / TLS? SMTPS, a method of securing SMTP with Transport Layer Security (TLS) came in to use around It is used for securing the SMTP transmission between 2 computers (i.e., point-to-point). The problem with is that it can pass through many, many points between sender and recipient, with each point being managed by different entities. There is no way to know which of these points is / isn t protected by SMTPS. In addition to this, the message contents can still be read by any of the intermediate points, as the content is still clear text. In summary, SMTPS cannot provide end-to-end security and so does not solve the problem. Technical Overview Page 3 of 16

7 Mkryptor key technologies There are 2 key technologies used by mkryptor to send secure messages. These are: Portable Document Format (PDF) with AES encryption Known Facts We will examine these in detail over the next sections Technical Overview Page 4 of 16

8 PDF with AES Encryption Why would you invent a new proprietary technology when a suitable open standard already exists? You wouldn t, and neither would we. It s just common sense. And that is why mkryptor uses standard PDF documents for its payload. Although not known by many, the PDF specification provides for various levels of encryption including, since 2008, AES 256, the de-facto standard for encryption preferred by military, government and security agencies throughout the world. What s more, PDF readers are built into nearly all new computers and smart-phones, or ship as part of standard software packages. And PDF files are understood by all mailing systems and firewalls. PDFs have become so much a part of normal digital life, that they are understood by almost everyone. When you send an through mkryptor, it takes the message body, converts it to a PDF, encrypts it and adds that PDF to the as an attachment. What about attachments? Another little-known feature of PDF is that it supports file attachments. So any files that were attached to the original will be stripped off and added in to the encrypted PDF payload. These attachments are shown at the top of the PDF. They can be opened or extracted, just as they could be from an ordinary . Not all PDF readers support attachments, but the most popular do, such as Adobe Reader, which is the most common desktop reader. There are also PDF readers available for most mobile operating systems that will support attachments. Other options While there is rarely any need to stray from the default set-up, mkryptor does offer some alternatives should you find a need them... You can use encrypted ZIP (AES 256, 128) as an alternative to PDF payload You can also change the level of encryption used in the PDF (e.g., AES 128, RC128, etc.) Any of these options can be set as a default, or can be overridden for an individual message. Technical Overview Page 5 of 16

9 Known Facts So we ve seen that mkryptor converts the payload to an encrypted PDF. But to open that PDF you would need a password, and we said that you didn t need to exchange passwords / keys with a recipient before sending them a message. This is where Known facts come in to play Essentially Known Facts are questions, with answers, that are used to create a password. When the recipient gets their they ll be shown the questions and told which characters of the answers make up the password. Mkryptor randomly grabs sections of each answer and combines them together in a random order to form a password. Known Facts can be absolutely anything that the recipient will know the answer to. They are free text. Obviously there is some art to choosing what to use as a known fact. For some guidance see the support article What makes a good Known Fact? on support.freshskies.com ## Cat s name : Tiddles ## City of birth : London ## Name of highschool : Dean Stanley ondeansttid To keep things simple for the recipient, certain transforms are applied to the password: All text is converted to lower-case All spaces are removed Dates are converted to the format DDMMYYYY (can be changed in regional settings) Mkryptor chooses a length for the password at random. By default it will be between 8 and 32 characters, but this can be changed in the configuration. You can add as many Known Facts to a message as you like. We recommend between 2 and 4 Technical Overview Page 6 of 16

10 These instructions are conveyed to the recipient in the outer (also called the cover message), in a similar manner to the example below: Figure 1 - Example of a cover Adding Known Facts to messages Known Facts are just text. You type them at the top of an that you want to encrypt. Because of this you can use any client, including smart-phones, etc. Known facts must be written one per line and, in the format: ## <question> : <answer> Spaces after the ## and before/after the : are optional (they will be ignored). You can add as many different facts as you like, but we recommend between 2 and 4 (the more you have the greater the complexity of the password) The ## is used as a special tag. When mkryptor sees a line beginning with this tag it knows it is an instruction it should parse. You can use any text you like for the <question> and <answer>. E.g: ## Cat s name : Tiddles ## City of birth : London Hi Dave, The combination for the lock on the crown jewels is 7, 5, 4, 2. Joe. Technical Overview Page 7 of 16

11 Special tags / facts In addition to just Known Facts, mkryptor will also recognise certain keywords (preceded by ##). These can perform a variety of functions, such as overriding encryption methods, adding a watermark to the PDF, using stored facts, etc. These special tags are detailed in the user-guide and in the support article on support.freshskies.com titled Tags reference. Storing / re-using Known Facts If you are sending to the same people on a regular basis you wouldn t want to have to type in known facts every time that you want to send them an encrypted . This is why with mkryptor business+ and enterprise editions, known facts can be automatically stored to a database the first time a message is sent. The database can be either an XML file on the mkryptor server or a Microsoft SQL Server database. To tell mkryptor to use stored facts when sending an encrypted message, simply add the special tag ##encrypt to the top of the . When mkryptor sees a message with the ##encrypt tag in, it will look in the database for any stored facts for the address(es) and use them to mkrypt the message. If no facts are found, the message will be returned to the sender. Note: It is possible to set mkryptor to always encrypt a message when known facts exist in the database. This can be set for the organisation as a whole, or on an individual address basis. Usually though we find that most people like to use ##encrypt, to give them the option. It is also possible to add known facts directly to the database, before a message is sent. This is useful in situations such as when taking on a new client a secretary can pre-add facts as part of the new-client set-up. This is also detailed in the user guide. Technical Overview Page 8 of 16

12 Where does mkryptor sit in my infrastructure? Mkryptor is an SMTP smart host. It is installed as a Microsoft Windows service and can live anywhere within your network (including on the same machine as your mail server). Because mkryptor is just an SMTP smart host it will work with pretty much any server or in any setup. There are various ways to incorporate it into your infrastructure. The normal place would be after your mail server, i.e., all messages coming out of your mail server are passed through mkryptor: Mkryptor does not affect messages that are not marked for encryption (i.e., don t have any Known Facts / tags). Those messages will simply pass-through. Because of this it is safe to pass all outbound messages through the mkryptor server. Mkryptor can understand SMTPS (SSL & TLS) and supports all the normal methods for SMTP authentication, so if you want to secure the link between your server and mkryptor then this is very simple to achieve. An alternative scenario used by some is to have the client (desktop, phone, PDA, etc.) use mkryptor as its outbound SMTP server, then have mkryptor send the (mkrypted) message onwards to the mail server for delivery. This can even be configured on a per user / domain basis (i.e., send Bob s messages to Server A and Susan s to Server B) For further information and guidance with installing mkryptor, see the mkryptor installation section of support.freshskies.com Mailserver Internet Technical Overview Page 9 of 16

13 Load balancing / redundancy You can have any number of mkryptor servers working together to provide load-balancing and redundancy. Again, because mkryptor uses standard SMTP, it will work with any equipment capable of load balancing SMTP. Also most mail servers support using multiple smart hosts for outbound mail. For mkryptor business+ and enterprise editions each mkryptor server will need to have access to the same Known Facts database (i.e., shared XML file or SQL Server database). Selective Routing It is safe to pass all messages through mkryptor (it doesn t do anything to messages not marked for encryption). However, if you have high volumes of , with only a small percentage of that mail requiring encryption, then you can choose to selectively route only those messages requiring encryption through mkryptor. This can be achieved with the normal filtering and [SMTP] routing rules of your server. For instance you could add a rule that sends any messages containing the text ## in the body to go via the mkryptor route and all other messages to go via a direct route. Some customers even like to have messages with ## in the body to go to mkryptor, then have mkryptor pass the encrypted version of the message back to the mail server, which delivers it via the standard route. Mailserver Internet Technical Overview Page 10 of 16

14 What about replies? It s all well and good being able to send information securely and confidentially to recipients, but what if they want to reply? You cannot expect all your recipients to have mkryptor, so we have added a way that they can reply without any software. To facilitate secure replies, we provide an auxiliary service called mkryptor satellite server (available with Business+ and Enterprise editions only). This is a small web app. It can be added as a virtual directory to your normal company website (e.g., or as a totally standalone site. Note: If you do not wish to install your own satellite server instance, mkryptor provide a cloud service at satellite Mailserver In the secure PDF there is a Secure reply button that the user clicks. This will open a web browser to the satellite secure reply page (SSL secured). From address, to address and subject are all pre-filled with details from the original message. The user types their reply in the box and clicks send. The satellite service will then create an encrypted package and transmit it to your mkryptor server in one of 2 ways: Via HTTP Mkryptor server can listen on a special http satellite communication port (port number can be set in configuration). The satellite service can talk to mkryptor over this channel. This HTTP method has the advantage of 2-way communication, which can provide delivery feedback to the satellite service, as well as enabling extra functions for the user such as changing their stored known facts and password, etc. This is the recommended method. Technical Overview Page 11 of 16

15 Note that mkryptor encrypts all traffic using AES256, so HTTPS is not required (but can be used). Via SMTP The satellite service creates an containing the encrypted blob of data as the body. This is then sent to a special mailbox (set in the configuration) that the mkryptor server can read. The message can travel in through your normal system. The only real advantage of this method is if you are using the mkryptor cloud satellite service and you do not want to open up a new firewall port. Because there is no 2-way communication, some functions of the satellite service will be disabled. Once the mkryptor server receives the message from the satellite service, it will decrypt it, convert it into an and deliver it to the mailbox of the intended recipient (via your standard SMTP mail connector). The reply can be delivered as an mkrypted PDF or, if your mkryptor server has a secure link to your mail server, it can be delivered as clear text. The easiest to use for your staff is to have mkryptor deliver the reply to their mailbox as clear text. If this is not feasible then each member of staff will set their own password for opening secure replies this is set the first time they send an mkrypted message, using the ##MyPassword special tag. Technical Overview Page 12 of 16

16 Can a recipient choose their own password / facts? As a recipient, if you re receiving regular messages from the same sender(s), it could eventually become tedious having to work out the correct answer to your Known facts questions each time (especially as mkryptor randomises the order of the questions, answers and the length of the password each time). To solve this we give the user the option to choose their own password and / or update the facts stored for them in your Known Facts database. This is achieved with the help of the satellite service (see What about replies? earlier in this document) and is only available for Business+ and Enterprise edition. In the Secure PDF there is a button for Change Password. If the user clicks this they will be taken to the Change Password page of the satellite service. Note: Unlike Known Facts, user passwords are case-sensitive. When setting a password it must meet some minimum complexity requirements. These can be altered in your configuration, but by default require a minimum of 8 characters with at least 1 upper-case letter and 1 number. The satellite service will communicate securely with the mkryptor server to update the Known Facts database. The user will receive a notification via to confirm their changes. Password changes only affect future messages. Passwords for messages already sent are set in the PDF and cannot be changed. Technical Overview Page 13 of 16

17 Do you offer a cloud service? More and more businesses are taking advantage of cloud platforms for running many of their services. And why not, cloud services have many advantages in cost, ease of setup and scalability. Fresh skies also offer mkryptor as a cloud service. Using the cloud service is virtually the same as having your own local install (minus the requirement for a server or installing software). You simply point your mail server / mail clients to the mkryptor cloud SMTP smart host servers, rather than to a local mkryptor SMTP smart host. See Where does mkryptor sit in my infrastructure? for more info. Mkryptor cloud offers all the benefits of Business+ edition, but for a small monthly cost (priced per user). See for more information. Technical Overview Page 14 of 16

18 What branding options do I have? When you install mkryptor, the cover messages for your mkrypted s will have mkryptor branding on them. These can easily be changed to match your own company branding. All the cover messages are stored as HTML templates. By simply changing a couple of images and some colours you can quickly modify them to match your own brand. Of course if you really want to you can go all-out and totally re-design them! For further info on how to set branding on your messages see the article titled How do I customise templates? on support.freshskies.com As well as templates, you can also set the branding for the satellite service web site. This uses standard CSS 3.0 style sheets and with a few tweaks you can have it looking just the way you want it. Changing the branding is a very simple task, but if you don t want to do it yourself, fresh skies do offer a branding service at an additional cost Technical Overview Page 15 of 16

19 Contact and further reading There are lots of more detailed articles available for particular topics at support.freshskies.com. If you have any further questions, please don t hesitate to contact us. W: T: +44 (0) E: tellmemore@freshskies.com our support website - Technical Overview Page 16 of 16

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..

More information

SecureMail User Guide

SecureMail User Guide SecureMail User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Using SecureMail to reply to

More information

Secure Mail Message Retrieval Instructions

Secure Mail Message Retrieval Instructions 2015 Secure Mail Message Retrieval Instructions IT Security University Medical Center 1/26/2015 Table of Contents INTRODUCTION... 3 REGISTRATION MESSAGES... 3 RETRIEVING THE SECURE EMAIL... 4 SECURE MESSAGE...

More information

User Guide - Table of Contents

User Guide - Table of Contents User Guide - Table of Contents Receiving Faxes Fax-to-Email Web Access to Faxes File Format Options Receiving Faxes on Wireless Devices Receiving Faxes Securely Integration and API Methods Archive Service

More information

Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011

Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1 Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form

More information

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010 Foundation IT Written approximately Dec 2010 1 Outlook Web Access With the new version of Exchange 2010 Outlook Anywhere has been enabled and configured with a secure socket layer (SSL) certificate from

More information

How to make the Emails you Send with Outlook and Exchange Appear to Originate from Different Addresses

How to make the Emails you Send with Outlook and Exchange Appear to Originate from Different Addresses How to make the Emails you Send with Outlook and Exchange Appear to Originate from Different Addresses If you only have a single email address from which you send all your business and personal emails

More information

Using WinGate 6 Email. Concepts, Features, and Configurations.

Using WinGate 6 Email. Concepts, Features, and Configurations. WinGate Feature Guide Using WinGate 6 Email Concepts, Features, and Configurations. Neil Gooden Qbik New Zealand Limited Rev 1.0 December 2004 2 Introduction...3 Basic Email Concepts... 3 Differences in

More information

NeoMail Guide. Neotel (Pty) Ltd

NeoMail Guide. Neotel (Pty) Ltd NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

Clearswift Information Governance

Clearswift Information Governance Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration

More information

Sutter Health. Send It / Secure It / Control It Cloud based data exchange for business. For more information / 1.800.672.7233 info@datamotioncorp.

Sutter Health. Send It / Secure It / Control It Cloud based data exchange for business. For more information / 1.800.672.7233 info@datamotioncorp. Send It / Secure It / Control It Cloud based data exchange for business For more information / 1.800.672.7233 info@datamotioncorp.com CHALLENGE: HIPAA compliance; cost containment SOLUTION: DataMotion

More information

Aloaha Mail and Archive

Aloaha Mail and Archive Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally

More information

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS)

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) This document provides an installation and configuration guide for MDaemon Messaging Server along with

More information

U.S. Bank Secure Mail

U.S. Bank Secure Mail U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email

More information

UC Irvine Health Secure Mail Message Center

UC Irvine Health Secure Mail Message Center UC Irvine Health Secure Mail Message Center UC Irvine Health is committed to protecting the privacy of its member s information, especially their protected health information (PHI). UC Irvine Health is

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Barracuda User Guide. Managing your Spam Quarantine

Barracuda User Guide. Managing your Spam Quarantine Managing your Spam Quarantine Barracuda User Guide Step1: Open your internet browser and go to http://myspam.datatechhosting.com this will automatically redirect you to Barracuda s email security service

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Using email over FleetBroadband

Using email over FleetBroadband Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

Administrator Guide. v 11

Administrator Guide. v 11 Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main

More information

Creating a Content Group and assigning the Encrypt action to the Group.

Creating a Content Group and assigning the Encrypt action to the Group. Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Service Overview & Installation Guide

Service Overview & Installation Guide Service Overview & Installation Guide Contents Contents... 2 1.0 Overview... 3 2.0 Simple Setup... 4 3.0 OWA Setup... 5 3.1 Receive Test... 5 3.2 Send Test... 6 4.0 Advanced Setup... 7 4.1 Receive Test

More information

Vodafone Hosted Services. Getting your email. User guide

Vodafone Hosted Services. Getting your email. User guide Vodafone Hosted Services Getting your email User guide Welcome. This guide will show you how to get your email, now that it is hosted by Vodafone Hosted Services. Once you ve set it up, you will be able

More information

Outlook 2010 Setup Guide (POP3)

Outlook 2010 Setup Guide (POP3) Versions Addressed: Microsoft Office Outlook 2010 Document Updated: 8/31/2012 Copyright 2012 Smarsh, Inc. All rights Purpose: This document will assist the end user in configuring Outlook 2010 to access

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government

More information

Ciphermail Gateway PDF Encryption Setup Guide

Ciphermail Gateway PDF Encryption Setup Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption

More information

How To Secure Mail Delivery

How To Secure Mail Delivery FortiMail Identity Based Encryption A Business Enabler WHITE PAPER FORTINET FortiMail Identity Based Encryption - A Business Enabler PAGE 2 Contents Business Need Secure Mail Delivery... 3 Challenges with

More information

Secured email Global Communication version 4.6

Secured email Global Communication version 4.6 Secured email Global Communication version 4.6 A new and improved way to receive Secured email Authors: Daniel Nilsson and Jeff Sherwood May 11, 2010 Content Introduction...3 Secured email...4 Sending

More information

Djigzo email encryption. Djigzo white paper

Djigzo email encryption. Djigzo white paper Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

E Mail Encryption End User Guide

E Mail Encryption End User Guide E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted

More information

GFI White Paper: GFI FaxMaker and HIPAA compliance

GFI White Paper: GFI FaxMaker and HIPAA compliance GFI White Paper: GFI FaxMaker and HIPAA compliance This document outlines the requirements of HIPAA in terms of faxing protected health information and how GFI Software s GFI FaxMaker, an easy-to-use fax

More information

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

Novar Database Mail Setup Guidelines

Novar Database Mail Setup Guidelines Database Mail Setup Guidelines August 2015 Delivering the Moment Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and

More information

How to Pop Email to Outlook

How to Pop Email to Outlook Webmail Access How to Pop Email to Outlook You can access your email account through the following URL: http://webmail.usalocalbiz.com. The login is your full email address and your account password. We

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

Pragmatic Version Control

Pragmatic Version Control Extracted from: Pragmatic Version Control using Subversion, 2nd Edition This PDF file contains pages extracted from Pragmatic Version Control, one of the Pragmatic Starter Kit series of books for project

More information

Version 1.7. Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide. Last updated October 2011

Version 1.7. Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide. Last updated October 2011 Version 1.7 Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide Last updated October 2011 1 Introduction and Overview... 1 2 The Case for Email monitoring... 2 3 Installation

More information

March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...

More information

Bridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process

Bridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process USER MANUAL DATAMOTION SECUREMAIL SERVER Bridging People and Process APPLICATION VERSION 1.1 Bridging People and Process Bridging People and Process Bridging People and Process Published By: DataMotion,

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange

More information

Talk Internet User Guides Controlgate Administrative User Guide

Talk Internet User Guides Controlgate Administrative User Guide Talk Internet User Guides Controlgate Administrative User Guide Contents Contents (This Page) 2 Accessing the Controlgate Interface 3 Adding a new domain 4 Setup Website Hosting 5 Setup FTP Users 6 Setup

More information

DJIGZO EMAIL ENCRYPTION. Djigzo white paper

DJIGZO EMAIL ENCRYPTION. Djigzo white paper DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic. OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

End-to-End Email Encryption for Everybody?

End-to-End Email Encryption for Everybody? White paper End-to-End Email Encryption for Everybody? Why private individuals and corporations need different solutions White paper End-to-End Email Encryption for Everybody? Why private individuals and

More information

Secure email Retrieval (First Time)

Secure email Retrieval (First Time) Department of Administration ETS is a customer based team that provides quality telecommunications & information technology services for all branches of state government. Secure email Retrieval (First

More information

Quick Start Guide Sendio Hosted

Quick Start Guide Sendio Hosted Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START

More information

Okta/Dropbox Active Directory Integration Guide

Okta/Dropbox Active Directory Integration Guide Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for

More information

MelbourneOnline Hosted Exchange Setup

MelbourneOnline Hosted Exchange Setup MelbourneOnline Hosted Exchange Setup Your email on our Hosted Exchange servers can be accessed by multiple devices including PC, Mac, iphone, IPad, Android, Windows Phone and of course webmail. It s all

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

PaperClip. em4 Cloud Client. Manual Setup Guide

PaperClip. em4 Cloud Client. Manual Setup Guide PaperClip em4 Cloud Client Manual Setup Guide Copyright Information Copyright 2014, PaperClip Inc. - The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Inc. All brand

More information

Security Considerations

Security Considerations Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver

More information

Secure Mail Registration and Viewing Procedures

Secure Mail Registration and Viewing Procedures Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email

More information

White paper. Why Encrypt? Securing email without compromising communications

White paper. Why Encrypt? Securing email without compromising communications White paper Why Encrypt? Securing email without compromising communications Why Encrypt? There s an old saying that a ship is safe in the harbour, but that s not what ships are for. The same can be said

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...

More information

WaveWare Technologies, Inc. We Deliver Information at the Speed of Light

WaveWare Technologies, Inc. We Deliver Information at the Speed of Light WaveWare Technologies, Inc. We Deliver Information at the Speed of Light Enterprise Messaging Software WaveWare Enterprise SMTP Email Server How-to Send an Email to a Pager Please Note This How to Guide

More information

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

8.7. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.7. Contents

8.7. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.7. Contents NET SatisFAXtion Email Gateway Installation Guide For NET SatisFAXtion 8.7 Contents Install Microsoft Virtual SMTP Server 2 XP and 2003 2 2008 and 2008 R2 2 Windows 7 2 Upgrade Path 2 Configure Microsoft

More information

Using Avaya Aura Messaging

Using Avaya Aura Messaging Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the

More information

FTA Computer Security Workshop. Secure Email

FTA Computer Security Workshop. Secure Email FTA Computer Security Workshop Secure Email March 8, 2007 Stan Wiechert, KDOR IS Security Officer Outline of Presentation The Risks associated with Email Business Constraints Secure Email Features Some

More information

Tax and Accounting Document Delivery

Tax and Accounting Document Delivery Tax and Accounting Document Delivery Encrypting PDF Files in Email Attachments: Reduce Risk, Automation and Compliance Administrative Items 90 Minutes (Education, Demo, Q&A) Participants are muted. Please

More information

Optus EmailSMS for MS Outlook and Lotus Notes

Optus EmailSMS for MS Outlook and Lotus Notes Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights

More information

8.6. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.6. Contents

8.6. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.6. Contents NET SatisFAXtion Email Gateway Installation Guide For NET SatisFAXtion 8.6 Contents 1.0 - Install Microsoft Virtual SMTP Server 2 XP and 2003 2 2008 and 2008 R2 2 Windows 7 2 Upgrade Path 2 Configure Microsoft

More information

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For Email client settings: Incoming Mail (IMAP) Server requires SSL: Outgoing Mail (SMTP) Server requires TLS or SSL: Account Name: Email Address: Password: imap.gmail.com Use SSL: Yes Port: 993 smtp.gmail.com

More information

Ciphermail for BlackBerry Quick Start Guide

Ciphermail for BlackBerry Quick Start Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail for BlackBerry Quick Start Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. Introduction This guide will explain how to setup and configure a Ciphermail

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

User guide Business Internet e-mail features

User guide Business Internet e-mail features User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features

More information

NODE4 SERVICE DESK SYSTEM

NODE4 SERVICE DESK SYSTEM NODE4 SERVICE DESK SYSTEM KNOWLEDGE BASE ARTICLE INTERNAL USE ONLY NODE4 LIMITED 24/04/2015 ADD A POP, IMAP OR OFFICE 365 ACCOUNT TO OUTLOOK USING CUSTOM SETTINGS If you re setting up Outlook for the first

More information

RPost Outlook Quick Start Guide

RPost Outlook Quick Start Guide RPost Outlook Quick Start Guide This document outlines the steps to send an email using the RPost services and a brief description of the features available with the RPost add-in for Microsoft Outlook.

More information

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4 Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access

More information

Business Case for Voltage SecureMail Mobile Edition

Business Case for Voltage SecureMail Mobile Edition WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central

More information

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox What is it? Why use it? Mitigating the risks of using Dropbox? Dropbox

More information

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal

More information

CREATING YOUR ONLINE PRESENCE

CREATING YOUR ONLINE PRESENCE CREATING YOUR ONLINE PRESENCE Congratulations on signing up for your webhosting package, you ve just completed the first and most important step in establishing your online presence. There are just a few

More information

DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE

DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE DATA PROTECTION OneWorld Encrypted Messages USER GUIDE Table of Contents 1 Why use Encrypted emails?... 3 2 Activation and Login... 4 2.1 Activating Your New OneWorld Encrypted Messages Account... 4 2.2

More information

Division of Information Technology Lehman College CUNY

Division of Information Technology Lehman College CUNY Division of Information Technology Lehman College CUNY Using Lehman s Secure Outgoing (SMTP) Server Updated April 16, 2013 Are you able to receive your Lehman email on your smart phone, laptop or tablet

More information

FileMaker Security Guide The Key to Securing Your Apps

FileMaker Security Guide The Key to Securing Your Apps FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account

More information

Configuring an Email Client to Connect to CASS Mail Servers

Configuring an Email Client to Connect to CASS Mail Servers Configuring an Email Client to Connect to CASS Mail Servers Table of Contents Introduction... 2 Webmail... 2 Settings... 2 Forwarding... 2 Email Client Configuration... 3 Outlook 2003... 3 Outlook 2007...

More information

BASIC CLASSWEB.LINK INSTALLATION MANUAL

BASIC CLASSWEB.LINK INSTALLATION MANUAL LINKS MODULAR SOLUTIONS BASIC CLASSWEB.LINK INSTALLATION MANUAL classweb.link installation Links Modular Solutions Pty Ltd Table of Contents 1. SYSTEM REQUIREMENTS 3 2. DATABASES 3 Standalone Links Database

More information

Shipping Services Files (SSF) Secure File Transmission Account Setup

Shipping Services Files (SSF) Secure File Transmission Account Setup Company This template is provided to document all of the materials and information needed for configuring secure file transmission for Shipping Services Files. Version 1.3 Page 1 of 5 1. Enter Date Submitted:

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Bank of Hawaii Protecting Confidential Email. What's in this User Guide

Bank of Hawaii Protecting Confidential Email. What's in this User Guide 1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, or financial information. By default emails are sent

More information

Training module 2 Installing VMware View

Training module 2 Installing VMware View Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

Versions Addressed: Microsoft Office Outlook 2010/2013. Document Updated: 2014. Copyright 2014 Smarsh, Inc. All right reserved

Versions Addressed: Microsoft Office Outlook 2010/2013. Document Updated: 2014. Copyright 2014 Smarsh, Inc. All right reserved Versions Addressed: Microsoft Office Outlook 2010/2013 Document Updated: 2014 Copyright 2014 Smarsh, Inc. All right reserved Table of Contents Getting Started 3 Add Your New Account 3 Account Setup 5 Basic

More information

Email Migration Manual (For Outlook 2010)

Email Migration Manual (For Outlook 2010) Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change

More information

How to configure Mac OS X Server

How to configure Mac OS X Server How to configure Mac OS X Server By Rob Buckley In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. See photo story here

More information

RemotelyAnywhere. Security Considerations

RemotelyAnywhere. Security Considerations RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP

More information

Wayland Student & Adjunct Email Account Instructions

Wayland Student & Adjunct Email Account Instructions Wayland Student & Adjunct Email Account Instructions Wayland Baptist University (WBU) provides email accounts to students and adjunct professors. These email accounts are an official form of communication

More information