Using Voltage SecureMail



Similar documents
Reading an sent with Voltage Secur . Using the Voltage Secur Zero Download Messenger (ZDM)

Texas Medicaid & Healthcare Partnership (TMHP)

ADP Secure Client User Guide

End-User Reference Guide

End-User Reference Guide

ADP Secure Client User Guide

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems

Using etoken for Securing s Using Outlook and Outlook Express

For all other applications, including new applications, please visit

MessageGuard 3.0 User Guide

Encryption. How do I send my encryption key?

Secure Frequently Asked Questions

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.

Guidance for using the East Sussex County Council Secure system

How to Send an Encrypted via KDADS' Outlook Client or Outlook Web Application

Using Entrust certificates with Microsoft Office and Windows

Encryption at the University of Miami Miller School of Medicine and University of Miami Health System

Receiving Secure s

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2007

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2010

Instructions for Microsoft Outlook 2003

Orbital ATK Secure Receiving Encrypted Messages. Why Orbital ATK Secure ? Initial Orbital ATK Secure Notification

EJGH Encryption User Tip Sheet of 8

Secur User Guide

Bridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process

Personal Secure Certificate

Secure User Guide

Configuring Outlook to send mail via your Exchange mailbox using an alternative address

Instructions for Secure Cisco Registered Envelope Service (CRES)

Unipass Secur Client. User Guide v1.2

How to set up Outlook Anywhere on your home system

Vanguard Secure Service (VSES) User Guide

Outlook Web Access Tipsheets

Adding Digital Signature and Encryption in Outlook

Page 1 Rev Date: February User Manual for Encrypted Services

Secure A Guide for Users

wce Outlook Contact Manager Documentation

SECURE COMMUNICATIONS PLAN Updated August 25, 2011

Accessing the Media General SSL VPN

Enrollment Process for Android Devices

ACS Encryption Recipient Guide

SECURE USER GUIDE OUTLOOK 2000

Using Your New Webmail

Can I manually trigger secure to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

Background Information

How to install and use the File Sharing Outlook Plugin

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts

Registering at the Secur site

3. On the Accounts wizard window, select Add a new account, and then click Next.

Bank of Hawaii Protecting Confidential . What's in this User Guide

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

Jumble for Microsoft Outlook

To open and/or save an attachment:

Honeywell Secure External User Guide August 2013

Receiving Secure from Citi For External Customers and Business Partners

Unipass Secur Client FAQ Document v1.1. This document a summary of some of the most common questions asked about the Unipass Secur client.

Accessing your using a web browser

Proofpoint Encryption Manual. 18 July 2014

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Steps to Opening Your First Password-Protected Envelope

PaperClip. em4 Cloud Client. Manual Setup Guide

GroupWise Web Access 8.0

Secure Client User Guide Receiving Secure from Mercantile Bank

Encryption Procedures

MSGCU SECURE MESSAGE CENTER

ing from The E2 Shop System address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

User Guide. The AMF's File Transfer Service (FTS)

NICCA User Guide for digitally signing Using Digital Signature Certificate (DSC) in Outlook Express

Use your UNNCNetID and password to log in. The first time you login to the system, you may receive the following screen:

Nationstar Mortgage Secure Client User Guide

Bank of Hawaii Protecting Confidential

Secure Global Desktop (SGD)

Using TLS Encryption with Microsoft Outlook 2007

Outlook Web Access (OWA) with Exchange Server 2007 (Windows version)

Instructions For Opening UHA Encrypted

setup information for most domains hosted with InfoRailway.

The IceWarp SSL Certificate Process

Client configuration and migration Guide Setting up Thunderbird 3.1

Outlook Web Access is accessible to all users where Internet access is available. This document contains instructions on how to use OWA.

Secure User Guide Receiving Secure from Merchants Bank

IceWarp SSL Certificate Process

IBM Aspera Add-in for Microsoft Outlook 1.3.2

Using Outlook Web Access (OWA) & Remote Web Workplace

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E

Configuring your client to connect to your Exchange mailbox

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!

Secur User Guide

4. Click Next and then fill in your Name and address. Click Next again.

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Overview of Registered Envelopes. Registered Envelope Notification Message

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

User Guide May Using Certificates in Outlook Express

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

Secure Message Center User Guide

O UTLOOK 2003 HELP SHEET MAIL. Opening the program. Mail

E Mail Encryption End User Guide

INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR. User Guide for the RightFax Fax Service. Web Utility

PREMIUM MAIL USER GUIDE

Transcription:

Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption. All that is needed to encrypt and sign an email is the recipient s email address and a single click of the Send Secure button. The Voltage SecureMail Desktop software integrates with leading email clients such as Outlook and Outlook Express to provide secure messaging without the need to change how you work. 1. Installation During installation of the Voltage SecureMail Desktop software you will be asked to provide your email address (identity or ID). If your enterprise does not automatically authenticate you via your login, you may be asked to authenticate yourself via email or a password. Once this is done, you are ready to send Secure Mail. 2. Sending Secure Email Sending secure email is easy just compose your message, add recipients and press the Send Secure button on your email client. The email will be encrypted and sent to recipients with your digital signature incorporated in the message. Send Secure Buttons Outlook Outlook Express Sending a secure email with Microsoft Outlook and Voltage SecureMail Agent

3. Receiving Secure Email With the Voltage SecureMail Desktop software, the decryption process for received secure messages happens automatically. Each secure email received also has a digital signature that is displayed with each decrypted message or viewed by clicking on the highlighted V button on the email client toolbar. The digital signature identifies the sender of the email and protects the recipient against spoofing. Any message with an invalid signature will automatically bring up an alert to the end user. If a private key is required to decrypt the message, you may be prompted to authenticate yourself. Once you have authenticated, the secure email will decrypt and reveal the contents. 4. Replying to Secure Email To reply to secure email, click on reply as you normally would to compose the message.

To reply securely, compose a message and click on the Send Secure button Your reply will automatically be encrypted, signed and sent.

Using Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending secure email as easy as sending it without encryption. The Zero Download Messenger allows you to receive, reply and initiate secure email without the need to download any software. This option provides the assurance to recipients that their secure email can always be read no matter what the email or desktop environment is. 1. Receiving Secure Email Open the attachment titled message_zdm.html to access your secure email. Click the Read Message button. With each secure email, there is an HTML attachment titled message_zdm.html that provides access to the Zero Download Messenger. The encrypted body of the original message as well as any attachments to the original email is contained in this HTML attachment. By opening the HTML attachment and authenticating yourself, you will be able to access your secure email and attachments.

After opening the message, you may be prompted to authenticate yourself by an email sent to the email address that you selected (or asked for a username and password if you have previously registered). Once you have authenticated, the secure email will decrypt and reveal the contents. The decrypted secure email will be presented to you with your web browser over a secure SSL connection. The digital signature identifies the sender of the email and protects the recipient against spoofing. Any message with an invalid signature will bring up an alert to the end user.

2. Replying to Secure Email Once you have viewed your secure email, you can reply to the originator, securely. To reply to a secure email via the Zero Download Messenger, click on Reply or Reply All to compose a reply message. To reply back securely, click on the Reply, Reply All or Forward button a new compose page will be presented. Compose your message and click on the Send Secure button Your reply will automatically be secured. If permitted, you may also upload attachments to be sent securely to your recipients.

3. Initiating Secure Email The Zero Download Messenger also allows you to initiate secure email without the need to download any software. The enterprise that is providing your secure email service can provide a link on their website where you can compose new secure email. When you visit the login URL, you are prompted to enter your email address (e.g. you@example.com). After entering your email address, you will be prompted to authenticate. Once you have authenticated, you will be presented with a compose page to create your secure email. If permitted, you may also upload attachments to be sent securely to your recipients.