Security-Product by IT SOLUTIONS. Email security at the highest level JULIA. E-Mail Security. Cloud Security

Similar documents
Options for encrypted communication with AUDI AG Version of: 31 May 2011

Office Standardization. Encryption Gateway. A Brief Guide for External Communication Partners.

CIPHERMAIL ENCRYPTION. CipherMail white paper

DJIGZO ENCRYPTION. Djigzo white paper

End-to-End Encryption for Everybody?

Djigzo encryption. Djigzo white paper

PGP Product Update Juha Ropponen

Management Solutions. Spamfinder. MailDepot. MailSealer. 100% spam protection for your business. Compliant, permanent archiving

The GlobalCerts TM Secur Gateway TM

Secure in times of rising mobile communication

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Cisco IronPort X1070 Security System

NETWRIX EVENT LOG MANAGER

Avira AntiVir MailGate 3.2 Release Notes

iq.suite Crypt - Server-based encryption - Efficient encryption for Lotus Domino

Secure Your with Encryption as a Service

Quick Reference Guide

D . A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information:

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Encryption Made Simple

Encryption Made Simple

How To Secure Mail Delivery

ELO management. The right decision for today and tomorrow

April PGP White Paper. PGP Universal 2.0 Technical Overview

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Collax Archive

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

SecurEnvoy Security Server. SecurMail Solutions Guide

InstaFile. Complete Document management System

IronPort C350 for Medium-Sized Enterprises and Satellite Offices

IronPort C650 Security Appliance for Large Enterprises and ISPs

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts

CTERA Portal Datacenter Edition

Mail Services. Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features

Receiving Secure from Citi For External Customers and Business Partners

Netwrix Auditor for Windows File Servers

White paper. Why Encrypt? Securing without compromising communications

Avira Endpoint and Security. HowTo

How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server)

Deep-Secure Mail Guard Feature Guide

Transglobal Secure Collaboration Program Secure v.1 Gateway Design Principles

Cisco IronPort C670 for Large Enterprises and ISPs

Setting up secure communication with Ericsson. Guideline for Ericsson partners

PineApp TM Mail Encryption Solution TM

VNC Zimlets. Version 1.0 Berlin, 06. August 2014

(51) Int Cl.: H04L 12/58 ( ) H04L 29/06 ( )

Securing enterprise collaboration through and file sharing on a unified platform

tips A quick and easy guide to securing your private information

Server Installation Manual 4.4.1

Netwrix Auditor for Exchange

IronPort X1000 Security System

OB10 - Digital Signing and Verification

The Challenge Handling a lot of paper documents

Avira Small Business Security Suite. HowTo

Message Handling Automation with ebxml. Case Study: Automated Document Transfer between the DBKK Health Insurance Company and their Business Partners

TrustKey Tool User Manual

RSA Digital Certificate Solution

Why you need secure

Netwrix Auditor for SQL Server

inforouter V8.0 Server & Client Requirements

Global Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)

IronPort X1060 Security System

OpenText Fax Servers and Microsoft Office 365

Service Launch Guide (US Customer) SEG Filtering

THE LEADING SOLUTION FOR SECURE CORRESPONDENCE. Encryption / Digital signature / Managed PKI

The Leading Security Suites

Securing enterprise collaboration through and file sharing on a unified platform

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

PostFiles. The file sharing and synchronization solution dedicated to professionals.

Top 10 Features: Clearswift SECURE Gateway

Sending s without the risk! Secure Communications with Rohde & Schwarz

Clearswift SECURE File Gateway

Implementing Transparent Security for Desktop Encryption Users

Secure Data Exchange Solution

Avira Exchange Security Version 12. HowTo

Enterprise Vault.cloud Deployment Checklist

Web Hosting. Hosting. Cloud File Hosting. The Genio Group (214)

Netwrix Auditor for SQL Server

Achieve more with less

NETWRIX IDENTITY MANAGEMENT SUITE

Certification Practice Statement

How To Protect Your From Being Hacked On A Pc Or Mac Or Ipa From Being Stolen On A Network (For A Free Download) On A Computer Or Ipo (For Free) On Your Pc Or Ipom (For An Ipo

Frequently Asked Questions

Datzilla. Error Reporting and Tracking for NOAA Data

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

Mobile Device End-to-End- Encryption for Organizations. San Francisco, April 20th, 2015 GABA / TeleTrusT: Security Solutions Showcase

Secure Frequently Asked Questions

DKIM Enabled Two Factor Authenticated Secure Mail Client

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide

Transcription:

Security-Product by IT SOLUTIONS Email security at the highest level Cloud Security JULIA MailOffice E-Mail Security wedn Sign Sig To

Global protection for your emails Convenience Statistics module: graphic rework of parameters like number of emails per time unit, number of cryptographic operations, etc. parameterizable in very small units, enabling adjustment to individual business requirements independent of clients, providing more security at low costs Corporate Identity can be adapted entirely (webmailer) compliant with multi-level security (infrastructure resists to disasters, respecting secrecy demands) Highest level of security by integrated encryption including absence management With JULIA MailOffice your whole email communication via internet is protected. Furthermore with the integrated encryption of JULIA MailOffice the entire email traffic within your company can be encrypted. This way you have an effective protection against spy outs of emails along the complete communication chain and you will not miss any comfort. JULIA MailOffice provides different features like absence management, automatic re-encryption and automated key generation, and all features are part of the standard shipment. Automated connection to a trustcenter The download of keys and certificates from a trustcenter can be automated with JULIA MailOffice. For instance entries at the active directory of a company can control the assignment of certificates to employees. JULIA MailOffice generates, applies and provides certificates fully automatically.

JULIA MailOffice is an extension of your email infrastructure for signature and encryption of your outgoing emails as well as for signature checking and decryption of incoming emails from a central point. JULIA MailOffice is embedded as SMTP mail server in your network environment ensuring consistent security and liability along the entire communication chain between two emailing partners. Email security coming from Germany JULIA MailOffice has been developed in Germany more than ten years ago and almost every federal office in Germany, lots of famous banks and insurances, as well as numerous medium sized and major enterprises use is now. Steady enhancements of the system maintain the high level of security and convenience. JULIA MailOffice also strives to meet the demands for certification of the Federal Office for Information Security in Germany called BSI. The crypto experts from the BSI verify JULIA MailOffice first and after successful certification they give the permission for sending documents via email as server based component. Thereby the documents are classified confidential by the government. Security according to international standard: Gothaer Finanzholding AG succeeds with JULIA MailOffice The basic component of JULIA MailOffice Signature and signature check from a central point Encryption and decryption from a central point JULIA MailOffice is your virtual post office. Incoming emails are checked for signature and encrypted emails are delivered to the recipient in readable form. Even a switch to other email environments like DE-Mail or epost can be realized. For outgoing emails you define inbound policies that are embedded in JULIA MailOffice. According to these central policies your emails are signed or encrypted electronically. Safe data exchange, even beyond emails Encryption and/or signature of emails based on S/MIME or PGP are the main tasks of JULIA MailOffice. If you require high security level and your communication partner does not have the right key you still are able to communicate with JULIA MailOffice in a secure way and thus respect the present security standards. Webmailer with password self-service: Your communication partner gets a webmail inbox that also enables to share big files in a reliable way. PDF encryption Encrypted PDF files will be sent as email ZIP encryption Attachments are converted into encrypted ZIP files and sent as email

Email security made in Germany Expandability and integration Open interfaces enable to access to the process chain of JULIA MailOffice and to meet particular requirements without any modifications of the implementation from the manufacturer or the need of vast and expensive projects. With the script interface of JULIA MailOffice you can customize your emails very easily. This way multiple options come with JULIA MailOffice in order to integrate the content of your emails into workflow systems, collaboration tools and document processing systems. Of course, you can combine JULIA MailOffice with email archiving systems. EDI processing is used at many places with JULIA MailOffice. The processing of signed (and qualified) email attachments is just one of several user benefits of JULIA MailOffice. Scalable solution for all needs JULIA MailOffice is an exclusive software solution and can be used as appliance even for small enterprises with less than 10 workstations or as a cluster for virtual or hardware based servers. Different sized enterprises use JULIA MailOffice for many years now, with 10, 30, 50, 200 or even 1000 and up to 100.000 different users. Features like multitenancy, cluster ability (load balancer and high availability), linear scalability, and different support concepts enable to a smooth and reliable use of JULIA MailOffice at mission-critical applications. Even small sized companies without own email infrastructure can protect the business emails by JULIA MailOffice. The system applies a particular email check routine where different inboxes coming from external email providers can be integrated. Specifications Compatibility S/MIME PGP TLS compatible with all common email clients (SPHINX interoperability test) implementation of SMTP standard applications - virus scanners - content checkers - email archiving - document management systems (DMS) Compatibility (more details) creates and gets certificates according to RFC (linked to trustcenters) download of keys from directory services (LDAP) Technical requirements Intel Core i3 processor 2GB RAM or more Linux operation system on Intel 100GB hard disk space or more

Functional principle of outgoing emails The user sends an email and the inbound mail server forwards this email via a virus or content scanner for example to JULIA MailOffice. By means of defined rules the system decides if the message shall be encrypted and/or signed. Then the message will be sent to the recipient. If no key or certificate of the recipient is available according to the policy the message can be stored on the webmailer of JULIA MailOffice or be sent as encrypted PDF file or encrypted ZIP file. The recipient gets a notification email and can check his message on the webmailer by password access and secure internet connection (HTTPS) and finally can answer with an encrypted email via the webmailer. Functional principle of incoming emails JULIA MailOffice verifies the validity of signature of an incoming encrypted and/or signed email and decrypts this email. If required you can at this point forward the email to an archiving system for storing the original email Subsequently JULIA MailOffice sends the email for further processing (e.g.: virus or content scanner) to the internal email infrastructure If required the inbound recipient can get an attachment containing a documentation of the signature or decryption process of JULIA MailOffice. Example environment of JULIA MailOffice MTA JULIA MailOffice MTA JULIA MailOffice MTA

Follow us on Allgeier IT Solutions GmbH Hans-Bredow-Straße 60 D-28307 Bremen Telefon: +49 421 43841-0 Telefax: +49 421 4380-81 www.allgeier-it.de info@allgeier-it.de