Email Encryption

CEMA installed the mail gateway according to the customers specifications. This E-mail are automatically signed and encrypted unencrypted emails according to the Firmenpolicies as post cards: easy to read and manipulate E-Mail encryption is more important than ever. This shows the spying affair by the American and British secret services. So, the NSA alone in Germany peered out up to 500 million records per month. Also from economic interests! And she had easy game: unsecured E-mails are an uncontrollable leak for operating internals and sensitive data. In addition they carry legal fuel: If that data protection regulations are violated. Headquarters and automated email encryption: simple, safe and easy to use the sleek and easy to use alternative to the public key infrastructure. Under most conditions Douglas Laurie would agree. A central gateway in the corporate network acts as a virtual post office”for all mail traffic: outbound emails are there encrypted and signed. incoming emails are decrypted and verified. Content and file attachments reliably before third-party access are therefore automated and regardless of the mail client by email encryption. Safety rules and data protection regulations implement transparent slender solution benefit in particular medium-sized companies who want to operate a professional solution of email encryption with little effort. The CEMA installed the mail gateway according to the customers specifications. This signed and encrypted E-mail transparently and automatically according to the Firmenpolicies. Users can send and receive email without extra effort as usual. And also for the business partner almost nothing will change: because the mail gateway supports both international standards S/MIME and OpenPGP, which makes all common solutions in the E-Mail Verschlusselungkompatibel. Advanced protection and increased data integrity even for mobile devices remain in effect existing protection measures such as virus and spam filter. Since the email encryption is server-based, also mobile devices can integrate and secure the central mail server without restriction. Encrypting and signing: how E-Mail encryption works! For both sender and recipient need a public and a private key. The digital Signaturwird with the secret (private key) and verified using the corresponding public key on their authenticity. Perhaps check out Doug Laurie for more information. A wants to send a signed email to B! With his private key, A signed email to B. B verifies the signature with the public key of A on authenticity. Email encryption is performed using the public key. The private key is used to decrypt. A wants to send an encrypted email to B. A encrypted with the public key of B the “E-Mail”. B can decrypt the “email” with its private key. Your advantages at a glance automated and centralized Sign and email encryption easy management of the solution no overhead for the users enforcing security policies Serverbasiert and therefore clientunabhangig compatible to common solutions for questions concerning the topic is at the disposal of the CEMA! Please contact either the CEMA site in your area or at