Email encryption the easy way

Employees send all sorts of information via email, including confidential data, to partners, customers and colleagues without considering the need for protecting that information. Laws and regulations now mandate companies to protect sensitive information through encryption. With Secured eMail, confidential information in an email can be encrypted at the touch of a button. It doesn’t matter whether the recipient is a co-worker or an external partner - he/she can open the encrypted information on any computer or smart device and send back an encrypted reply.

Secured eMail provides powerful end-to-end, easy to use email encryption. Secured eMail integrates into Microsoft Outlook and Lotus Notes. To send an encrypted email, the user just presses the Send Secured button. Recipients of secured emails do not need to purchase a license in order to read the email or reply securely. It is so simple to protect confidential information, can you afford not to?

Business Benefits

  • Send secured emails from Outlook and Lotus Notes

    Secured eMail integrates with Microsoft Outlook and Lotus Notes so that users can use the email client as usual. To secure the contents of an email and send a secured message, the user simply presses the "Send Secured" button. The secured content is delivered as an attachment wrapped in an ordinary email. The “wrap-mail” provides plain text instructions to the recipient about what they need to do to read the secured contents.

  • Open secured emails on any platform

    With Secured eMail the recipient can open the encrypted email on almost any platform or email service including PC, Mac, iPhone, iPad, Blackberry, Android phones, Windows Mobile phones, Linux, all types of webmail like Gmail, Hotmail, Outlook OWA. The only requirement is an internet browser and an internet connection.

  • Built in help for users

    Each encrypted email is sent as an attachment to an ordinary, plain text email, referred to as a “wrap-mail”. The wrap-mail contains instructions for the recipient about how to open the encrypted email. Instructions are easy to follow making the process as simple as possible. Best practice templates for the wrap-mail are provided as standard allowing organizations to deploy Secured eMail quickly. Alternatively, the templates can be customized and branded as required.

  • Central management and control

    The Central Management Console enables IT administrators to deploy and manage all aspects of email security. Secured eMail is deployed using built-in Active Directory deployment tools. Policies, groups and users are mirrored from Active Directory. Administrators can then use the Central Management Console to change, add or delete policies, licenses and secure groups, which are then automatically pushed out to the clients.

  • Send secured to anyone

    It is really easy to receive and read a secured email, whether you are an employee in the same organization as the sender, or an external customer or partner. There are several ways to open a secured email: through a web browser, by installing the Secured eMail client, or by downloading the free Secured eMail Reader.

  • A secure communications channel with customers and partners

    With Secured eMail the recipient can not only open and read the encrypted email, but also send an encrypted and secured email reply. Thus organizations can establish a secured communications channel with customers and partners. The recipient can either register to open encrypted emails in a web browser, or can download the Secured eMail Reader software to open encrypted emails in their email client. Both options are available to everyone at no cost.

  • Regulatory compliance

    Strong FIPS-certified AES 256 encryption complies with the Sarbanes Oxley Act (SOX), GLBA, HIPAA Hitech, PCI/DSS, FTC Red Flag Rules and many others. Security policies are automatically enforced for all users, and detailed reporting of user actions provides a comprehensive audit trail.

Top Features

  • automatic user authentication

    Automatic user authentication

    Secured eMail creates a secure end-to-end virtual channel between the sender and receiver. The first time a secured email is sent the receiver needs to authenticate using a “shared secret” created by the sender, or by registering and creating a Global Communications account to receive secured emails. After that, authentication happens automatically and the recipient just double clicks on the email to open it.

  • email encryption

    Email encryption online and offline

    Users can secure outbound emails even when they are working offline. Pressing the Send Secured button will encrypt the outbound email, embed it in the wrap-mail, and move it into the user’s Outbox. When the user goes back online the email will be sent automatically.

  • Free encrypted email reader

    The receiver doesn’t need to purchase any software in order to open an encrypted email. The receiver can download a free Secured eMail Reader application (full instructions are included for the recipient in the wrap-mail). The email Reader integrates into Microsoft Outlook and Lotus Notes and will automatically decrypt and open secured emails in the email client just like any other email. The recipient can also reply back with a secured email directly from the email client. For other email clients, just open the attachment to see the secured content.

  • helpdesk passwd recovery

    Helpdesk password recovery

    When users forget or lose a password, Secured eMail comes with a built-in feature to support the HelpDesk with password recovery.

  • endpoint to endpoint security

    Endpoint-to-endpoint security

    Secured eMail establishes a secure channel from user to user, not just gateway to gateway, ensuring that confidential information is protected at all points. Regardless of whether your organization is using a hosted exchange or Hotmail, secured emails will be stored encrypted at the receiver’s mail server and email client as well as the sender’s mail server and email client.

  • Any computer any email service

    Any computer, any email service

    Secured eMail automatically synchronizes your settings, secured groups and passwords to the central server so you can log in and use Secured eMail on any computer in the network. The receiver can access the secured content from any email service. The encrypted content is sent using the MIME layer as an attachment to the wrap mail, allowing the user to access the email from anywhere including public mail services such as Gmail and Hotmail.

  • Automatic data compression

    Data is automatically compressed up to 5 to 1, thereby increasing storage capacity and transmission speeds.

  • Brute force protection

    Built in brute force protection system protects the inherent encryption methodology against professional hackers.

  • Key Management

    Key management

    Key management has traditionally been an issue with encryption solutions and expensive. Secured eMail is a fully automated solution. EPM Stealth keys are automatically generated and synchronized between server and client, so there is no need for manual key management.

Technical Specifications

SEP Client Requirements

Client Hardware Hardware:
  • Pentium 2.2 GHz processor
  • 512 MB of RAM
  • 100MB available hard disk space
Supported Operating Systems: SEP Client is Windows 7 Certified
  • Microsoft Windows® 8
  • Microsoft Windows® 7
  • Microsoft Windows® Vista
  • SEP driverless client (Secured eUSB is not supported on Windows servers):
    • Microsoft Windows® Server 2003, 2008, 2008 R2, 2012
General Requirements:
  • Internet connection
  • Microsoft Internet Explorer® 7 or higher
Secured eMail on Microsoft Outlook® Client Hardware
  • Microsoft Outlook® 2013
  • Microsoft Outlook® 2010
  • Microsoft Outlook® 2007
  • Microsoft Outlook® 2003
Secured eMail on Lotus Notes Client Hardware
  • Lotus Notes 6.5 - 8.5.2
  • Domino Server 6.5 - 8.5.2

SEP Management Console

Client Hardware Hardware Minimum Requirements:
  • Computer/Processor with Pentium 1.5 GHz
  • 2 GB of RAM
  • 500 MB of available hard disk space
Supported Operating Systems:
  • Windows® Server 2012
  • Windows® Server 2008 SP2, 2008 R2 SP1
  • Windows® Server 2003 SP3, 2003 R2
  • Windows® 8
  • Windows® 7 SP1
  • Windows® Vista SP2
General & Software Requirements:
  • Internet connection
  • Microsoft .Net Framework 4.0
  • Request a Call

Customer Success Stories

To see all Customer Success Stories and Case Studies relating to this product, please click here.

  • NCC Construction

    Large workplaces must take effective security measures. The priority is to guarantee the safety of the employees and ensure they can perform their assignments under safe circumstances. But it is also important to secure the organization’s data and resources, to protect the company whilst also supporting a smooth workflow and secure working environment. Download the Case Study

  • Request a Call

Simple Encryption Platform

Simple Encryption Platform Concept Image

The Simple Encryption Platform from Cryptzone is designed to empower end users to secure data easily. Whether information is in transit; email, flash drives, portable media, or stored on a corporate network or SharePoint intranet, SEP will secure it.

The struggle for data control within organizations is not a new problem as laws and regulations dictate compliance. Historically encryption solutions have been notoriously difficult to implement, use and manage with many organizations hesitating to implement encryption solutions. With SEP from Cryptzone, encrypt and secure data with its simple encryption technology at the click of a button or implement policies to do this automatically.

Products in the Simple Encryption Platform

Resources & Related Literature

Other Literature

Data Sheets: PDF Download

Secured eMail

Demos