Home  //  Tags
ReSoft Blog
Reputation and Risk Management through Data Loss Prevention, ediscovery and Compliance in email, Social Media and mobile

Next-gen email security analyzed Subscribe Email Print

TechTarget have done a nice job of analyzing the next generation of email encryption tools. Email encryption, as the name implies, encrypts email messages and attachments in transit from sender to receiver to protect contents from unauthorized access. The encryption may trigger automatically, encrypting messages based on content, attachment type or it may work manually, requiring the user to choose an encryption option for each email message to be protected.

The second generation of email encryption products, is in wide use compared to the first generation, has no PKI-key exchange requirement. Keys are created dynamically to handle all or virtually all of the key management behind the scenes.

The analysis covers:

  • Internal and/or
Read more

Contact Re-Soft today to get help!

helpdeskimage

To order products or request more information, click here or email This email address is being protected from spambots. You need JavaScript enabled to view it. detailing your requirements or call us at (203) 972-8462 to discuss your needs.
Scroll Up