Users send their emails as usual, and the body of the message and any email attachments are automatically and transparently encrypted. Upon reception, the emails are decrypted locally and the original message is reconstituted.
The messages are encrypted then decrypted with the password or certificate of the sender and the recipient. These secrets are not therefore entrusted to third-party machines/ software (VPN, encryption units, etc.), thereby guaranteeing that the content can only be consulted by those with the keys (Right-to-Know).
ZEDMAIL is integrated in the enterprise messaging system and has no impact on the way it runs. Once the user is authenticated, the encryption/decryption operations take place entirely automatically. The messages transit encrypted over the network and the messaging server.
ZEDMAIL is compatible with the push-mail features of enterprise messaging systems: the messages that are received encrypted on
the user’s mobile terminal will be decrypted locally.
In order to exchange encrypted messages with correspondents outside the company, PRIM’X proposes a free, multi-platform version: ZEDFREE. With this freeware, it is possible to consult encrypted messages and attached files whatever the messaging system of the recipient, and for the latter to reply in encrypted form.
To encrypt emails, ZEDMAIL uses the certificates of the recipients which it looks up automatically in the usual enterprise directories (AD, LDAP) and in the user’s personal certificate stores.
When no certificate is available for the email recipient, ZEDMAIL automatically generates a password for this correspondent and saves it in a password file (wallet) that it manages for the user. The sender can therefore send emails to any recipient with no additional operation required.
A recovery plan may be configured by the company. It will be applied automatically and systematically by ZEDMAIL so as to enable the Security Officer to recover the messages.
The installation of ZEDMAIL on workstations is compatible with the administered installation tools (SMS et al.).
The security policy applicable to the messaging system is defined by the Security Officer using Windows Security Strategies (Policies).
Encrypted message maintenance (key renewal, recovery maintenance, etc.)
Migration from S/ Mime
Selective encryption (file attachments only)