Archive for March, 2011:
Email encryption has become more important as email continues to grow as the primary method of business communication. Fortunately, today it is less difficult to encrypt email than ever before. Here are five common misconceptions about email encryption.
Email Encryption is only needed for the HealthCare and Financial industries.
Clearly, those industries are required to maintain patient/customer information confidential even while communicating via email. However, Osterman Research reports that 29% of all corporate email contains attachments. People usually forget that when they click “Send”, more often than not, that message goes out as plain text across the Internet. That great new idea or plan to increase the 4th quarter earnings are there for the world to see. Encryption give you a way to communicate those plans securely.
TLS is all the email encryption you need.
Transaction Layer Security does provide a secure pipe between message transport agents (MTA). It does not encrypt the message. Messages are still sent in plain text. Additionally, if the recipient’s MTA or email server is not set up to receive email via TLS, the message is sent just like it were inviting a friend to lunch.
A user has to take some action to encrypt a message.
Yes, some systems require a “positive action” to encrypt email. However, requiring users to take a positive action to encrypt email is a guarantee that some email will not be encrypted. Do you want to stake your company’s future against a law suit depending that no one will make an “Oops!” with exactly the wrong email?
Email encryption systems are all or nothing.
With some email encryption systems, you either have to assign an account through which the entire organization sends encrypted email. In this case, all email comes from the same sender which can confuse replies.With other systems, all messages get encrypted to the recipient period. Policy-based encryption employs “smart technology” using policies the organization sets. If an email message meets the policy, it is encrypted. If not, it goes out normally.
Email Encryption requires expensive add-ons or appliances.
Encryption used to require costly add-ons to the email server or appliances. With Software as a Service Policy-Based Encryption, organizations only pay for the service not the software or hardware. This “pay for what you need” system makes the same high level of encryption service available to the 1,000 user organizations as well as to the 25 user businesses.
You can realize the benefits of Policy-Based Encryption whether you host your own email server or wish to migrate to a hosted Exchange system. Now you can enjoy PBE at a significant discount if you sign up during March, 2011. For more information and to download a Whitepaper, click here.