+90(216) 352 13 68-70 info@teknoa.com.tr

Email Encryption





Overview

In today’s digital world, paper documents transported in inter-office folders, through the mail, or by courier are becoming a thing of the past. While convenience is at an all-time high, there are risks associated with any type of electronic communication. How confident are you that your confidential business emails and documents are truly private?

Thales' Public Key Infrastructure (PKI) provides strong authentication to secure all of your critical documents including customer data, intellectual property, legal and financial information and employee records. Whether you’re mandated by government regulations (such as HIPAA, SOX and GDPR) or just proactively thinking about your enterprise business needs, our end-to-end protection ensures your data will be seen by only those intended and certifies authenticity of the documents exchanged based on a verified digital identity.

For the majority of us, email has become a business critical application. And while most messages don’t contain top secret information, there are times when you need to take extra precautions to ensure security of sensitive information. Thales secure identity solutions use a cryptographic process to provide email encryption that can only be decrypted by the intended recipient—keeping your email safe from unwanted eyes.

Thales PKI uses Secure Multi-Purpose Internet Mail Extensions (S/MIME), a system for sending e-mail securely using encryption and digital signatures. Thales solutions, including smart cards and USB tokes all support symmetric (secret) key algorithms—Data Encryption Standard (DES) and Advanced Encryption Standard (AES), as well as asymmetric (public/private) key algorithms—RSA and Elliptical Curve Cryptography (ECC).


All-in-one convenience

In addition to digital signature, Thales PKI-based hardware solutions can provide multiple security functions in one device. For example, smart cards can be used for authentication, endpoint protection, digital signature, email encryption and physical access to buildings and secure areas.


More than: https://cpl.thalesgroup.com/access-management/email-encryption




...