
What are email key pairs and certificates, and how are they used?
Whether for email signing or encryption, they come in pairs: private and public. How can your business/organization manage them without issues? Read more

Why digital email signatures and encryption go hand in hand
Digital signatures are a powerful sender authentication tool, but without encryption/decryption abilities, you're in for a headache. Learn why. Read more

Zertificon’s Z1 SecureMail Gateway enhances Microsoft 365 for confidential email exchange and ECB exploits prevention
Z1 SecureMail Gateway enhances the M365 infrastructure with email encryption according to the S/MIME and OpenPGP standards as well as password-based [...] Read more

When can I use domain certificates for email encryption?
Domain certificates are certificates issued to legal entities. Are these certificates useful and what should be considered? Read more

End-to-end email encryption – best practices for enterprises
Businesses need secure email. It needs to be confidential, compliant. So end-to-end encryption is the answer? Here is what E2EE means for enterprises. Read more

Patented email encryption solution for exchange with contacts without certificates
During your search for an email encryption solution, you may come across information giving the impression that Zertificon is infringing an existing [...] Read more

What does the use of cloud services mean for email security?
How can organizations achieve secure email and GDPR compliance in the cloud? Find out about encryption and signing with cloud services. Read more

Unencrypted emails endanger companies – especially during the pandemic
Restrictions in public life in the wake of the pandemic have led to a surge in digitization in many areas. At the same time, criminals are using the [...] Read more

4 Benefits of Shorter X.509 Validity Periods for Web and Email Certificates
Email certificates for S/MIME encrypted communication use the same technical standard as browser certificates. Both are X.509 certificates with different [...] Read more

Intercepted emails in times of big data – the underestimated threat
Nearly daily news of cyber attacks on companies reaches us. Hackers obtain access to internal networks. What about sensitive data that is transferred via [...] Read more