End to end email encryption


 

Discover in this video the user experience of the ZEDMAIL encryption solution.


End to end email encryption

  1. Protection of internal message exchanges
  2. Protection of external message exchanges
  3. Creating a privacy policy by classification
Encryption email video


 


ABOUT ZEDMAIL 

ZEDMAIL

Encrypted enterprise messaging

Directly integrated in the enterprise messaging system, ZEDMAIL is an end-to-end encryption solution.

Learn more


 


 


 



 

 

End-to-end encryption...

Users send their emails as usual, and the body of the message and any email attachments are automatically and transparently encrypted. Upon reception, the emails are decrypted locally and the original message is reconstituted.

... with the users’ secrets

The messages are encrypted then decrypted with the password or certificate of the sender and the recipient. These secrets are not therefore entrusted to third-party machines/ software (VPN, encryption units, etc.), thereby guaranteeing that the content can only be consulted by those with the keys (Right-to-Know).

Integration in the enterprise messaging application

ZEDMAIL is integrated in the enterprise messaging system and has no impact on the way it runs. Once the user is authenticated, the encryption/decryption operations take place entirely automatically. The messages transit encrypted over the network and the messaging server.

Secure exchanges and synchronization with mobile terminals

ZEDMAIL is compatible with the push-mail features of enterprise messaging systems: the messages that are received encrypted on
the user’s mobile terminal will be decrypted locally.

Secure exchanges with partners

In order to exchange encrypted messages with correspondents outside the company, PRIM’X proposes a free, multi-platform version: ZEDFREE. With this freeware, it is possible to consult encrypted messages and attached files whatever the messaging system of the recipient, and for the latter to reply in encrypted form.

Encryption by certificate

To encrypt emails, ZEDMAIL uses the certificates of the recipients which it looks up automatically in the usual enterprise directories (AD, LDAP) and in the user’s personal certificate stores.

Integrated password wallet

When no certificate is available for the email recipient, ZEDMAIL automatically generates a password for this correspondent and saves it in a password file (wallet) that it manages for the user. The sender can therefore send emails to any recipient with no additional operation required.

Recovery

A recovery plan may be configured by the company. It will be applied automatically and systematically by ZEDMAIL so as to enable the Security Officer to recover the messages.

Easy deployment and administration

The installation of ZEDMAIL on workstations is compatible with the administered installation tools (SMS et al.).
The security policy applicable to the messaging system is defined by the Security Officer using Windows Security Strategies (Policies).

News in V6

Encrypted message maintenance (key renewal, recovery maintenance, etc.)
Migration from S/ Mime
Selective encryption (file attachments only)

 


 

 

© All right reserved PRIM'X | 2022 

  Twitter    Linkedin