Email Encryption FAQsubheading text here
What security technology is used for encryption?
Encrypted Mail uses standard-based technology, such as Public Key Infrastructure (PKI), S/MIME, and X.509 certificates to establish confidentiality, message integrity, and user authentication.
Can I send an email to anyone?
Yes, you can send an email to anyone.
How are scanned outgoing emails managed?
Policies can be configured to encrypt and send, return to sender or delete messages with insecure content. Comprehensive reporting lets you track and monitor all outbound email activity.
How do recipients receive emails?
Recipients retrieve their messages from a secure Message Pickup Center, where they can read, reply, reply-to-all or forward encrypted messages.
Are attachments scanned?
Yes, attachments are scanned and policies are applied based on the content of the attachments.
What attachments does it support?
Encrypted Mail encrypts any MS Office document, .PDF file, image file, and almost any other popular file format.
Are emails from mobile devices encrypted?
Yes, policy-based Encrypted Email supports emails sent from BlackBerry, iPhone, Android, Windows Mobile, and Symbian mobile devices.