BLOG

 

Lawyers are in doubt that email traffic is secure enough for their sensitive correspondence. To shield themselves, they require clients to sign a declaration of consent for non-encrypted email exchanges. Yet, as our latest user report shows, it is quite easy these days for law offices to encrypt emails.

[  Read article ]

 

Well-protected trade secrets are often the basis of a company’s economic success. When confidential information is stolen, businesses appeal to available legal remedies or submit insurance claims. The European Union’s Trade Secret Directive defines clear consequences for handling trade secrets. It is recommended that all companies, i.e. not only innovation-driven companies, familiarize themselves with the ...

[  Read article ]

 

Big potential savings and new risks through automated invoicing Big savings can be achieved by automating the process of sending out invoices and not having to print them, put them in envelopes and pay for the postage. A study by Deutsche Bank* calculates the added cost to the service provider of a paper invoice to be ...

[  Read article ]

Probleme bei Ad-Hoc Ausstellung von Email Zertifikaten
 

Should you use alternative delivery methods or issue certificates yourself? Encryption with password – proven technology, very user friendly Not every email address you want to exchange confidential emails with has a detectable valid certificate. In this case, where a secure email gateway is being used, password-based encryption procedures are normally applied to enable quick and secure communication. ...

[  Read article ]

 

We are always being asked about the possibilities of using domain certificates in email encryption. In this article we will attempt to clarify the situation. Zertificon Solutions’ domain certificate for mail encryption search result at Z1 Global TrustPoint Domain certificates, also known as gateway or organisation certificates, are usually issued in the name of a company or ...

[  Read article ]

 

There are solution providers around who develop their own encryption solutions. They claim that these solutions are ultimately secure but proof is lacking. Clever marketing lures the customer into the belief they can implicitly trust this solution to be truly secure and also does not contain any back doors. This trust is not always deserved ...

[  Read article ]

 

For exchanging data and information in a business environment emails are considered to be the de facto standard based on their efficiency and fast delivery. But when it comes to sending larger files such as construction plans, reports, presentations or media files such as videos, email quickly reaches its limits. Both mail servers and mail boxes do ...

[  Read article ]

 

When your business grows and you have customers or partners all over the world, communication is the key. Email plays a major role in international business communication because different time zones limit other communication such as phone calls to limited time frames. The good news: Email is international. You can exchange emails with the whole world without ...

[  Read article ]

 

What’s the definition of end-to-end in a business environment? End-to-End encryption is not a protected term. Usually it is understood as unbroken encryption from the sender’s device to the recipient’s device. You will find however various interpretations of E2EE depending on the context and perspective. Corporate email encryption with a Gateway In a business environment you might actually ...

[  Read article ]

 

Secure Email Gateways can ensure that emails are delivered securely from the employee’s computer right to the recipient. For organizations, companies and public agencies that do not use use mobile end devices and do not have any secrets to hide from their mail server admins, a Secure Email Gateway is all they need.

[  Read article ]