As secure e-mail communication continues to gain importance, ease of administration and use must not be ignored. The Skyfillers encryption service delivers both.
Using encryption technologies has not become commonplace yet because they tend to be difficult to implement and are often associated with significant administrative effort for users or IT personnel. With the cloud-based Skyfillers encryption technology, the end user does not have to take any special action whatsoever.
Implementing e-mail encryption in a company also means centrally establishing the required rules and guidelines while always maintaining an overview of all encrypted e-mail traffic. Our tool provides a comprehensive control panel for e-mail encryption.
Skyfillers provides IT administrators with numerous options for easily implementing and managing the encryption of e-mail traffic, such as handling user certificates and the individual adaptation of encryption guidelines.
Encryption features | Benefits |
---|---|
Personal e-mail certificates for digital signing and encryption | Skyfillers uses 2048-bit encoded certificates from one of the largest, most reputable certificate authorities. This makes the exchange of encrypted data with third parties easier. |
Automatic certificate management | No effort for the procurement and installation of the required certificates – this is handled by Skyfillers. |
Fully automated digital signing and encryption of outgoing e-mails using S/MIME and PGP | Protection of e-mails against unauthorised changes and third-party access during transmission over public networks (Internet). |
Automatic decryption of incoming e-mails | If the sender’s public key is available, e-mails are automatically decrypted and delivered to the recipient. |
Automatic key storage in a certificate store | Easy key management with no intervention by administrators or users. |
Individual setup of encryption guidelines | Clients can decide whether e-mails are encrypted or not prior to sending and how to proceed if the recipient’s key is not available. |
Ability to test the encryption capability | Review of the encryption options of communication partners through the control panel. |
Easy ordering of certificates | Ordering new certificates takes very little time: When new certificates are required, this is done through the control panel – also as a ‘subscription’. |
Forcing encryption with Websafe | Individual safeguarding of confidential e-mail traffic with specific communication partners. |