Email Encryption Services

Email Encryption Services

email_encryption
Encrypted Email automatically filters and scans your emails to help protect your company against data loss. It also helps you comply with HIPAA, SOX, GLBA, California's Security Breach Notification Act, the Massachusetts Encryption Law, and more.

Automatic. Comprehensive. Easy to manage and easy to use.

read more

Automatic

Encrypted Email helps you enforce compliance based on pre-defined policies and rules. This helps reduce human error and minimizes the risk of security breaches.

Comprehensive

As a critical piece of your company’s overall privacy strategy, Encrypted Email helps you to monitor email content, identify confidential information that's leaving your company and track where it is being distributed.

This is a powerful compliance tool for organizations in the health care, legal and finance industries or operating in states with privacy protection laws

Easy to manage and easy to use

Encrypted Email from Zecontech helps you to find the right balance between ease-of-use and strict control. Learn why this service satisfies users, admins and compliance officers.

HIPAA Templates

Zecontech's Encrypted Email service features a unique set of templates designed to help businesses that operate in the health care industry simplify the compliance with the Health Insurance Portability and Accountability Act (HIPAA).

Why encrypt email?

Email is a convenient, fast and efficient way to communicate and share important information.  However, it is an inherently insecure medium, as emails travels through multiple public and private networks and data lines between sender and recipient.  Because email by default is sent in a unencrypted format, anyone who can intercept the email in transit, can easily access of its its contents, including any attachments.

By encrypting email with Encrypted Message, only the sender and recipients, who have a special decryption key, can read the contents of the message and its attachments.  If someone intercepts an encrypted message, or tries to access it without permission and the decryption key, they will be unable to read the email or its attachment.

Who Should Encrypt email?

All businesses, and their professional advisors, agents and clients should take steps to protect the privacy of their email. Businesses that need encrypted email include:

Financial Services – Banks, brokerages, insurance companies, wealth management, accountants, financial advisors

Healthcare – Physicians, clinics, health associations, health networks, hospitals, pharmacists, pharmaceutical companies

Business Professionals – Lawyers, headhunters, investigators, consultants, human resource professionals, embassies

Businesses need to be able to trust email communications and reduce the risk of damage to their brand. Professional advisors such as lawyers, financial advisors, accountants, educators, and healthcare providers, all have ethical and fiduciary duties to keep their clients' personal information confidential.

Regulatory Compliance controls risk and maximizes security

Governments have enacted legislative measures to protect the privacy and reliability of business and personal information. Encrypted Message meets these industry-specific privacy legislations including:

 Health Insurance Portability and Accountability Act (HIPAA) is an example of legislation that protects personal information sent amongst health care professionals, such as patient health records, test results, x-rays, and prescriptions, are used, disclosed, and protected.

Sarbanes-Oxley Act (SOX) governs integrity of financial operations of publicly traded companies with the primary goal of protecting “investors by improving the accuracy and reliability of corporate disclosures made pursuant to securities laws”.

Gramm-Leach-Bliley Act (GLBA) required that all financial institutions (i.e., businesses engaged in banking, insuring, stocks and bonds, financial advice and investing) maintain safeguards to protect customer information.

California Security Breach Notification Act (SB 1386) required that companies, in the event of a breach of the security system of a database containing personal information (e.g. social security number; driver's license number of California Identification Card number; or account number, credit or debit card number, notify all California residents whose unencrypted personal information was in the database at the time of the data breach.

Fully managed email encryption solution

If your customer is already using your  hosted Exchange service, then encrypting your mail is easy.   With Encrypted Message, users can quickly, easily and intuitively send email with confidence. Encrypted Message is built on industry-trusted encryption standards, and provides the tools you need to simply and easily administer users. We host and manage the hardware and software needed to enable encryption and decryption processes, and management of digital identities. We administer the system and support you while you control your users.

How does it work?

The Encrypted Message solution includes a small desktop plug-in the works with Microsoft Outlook and Outlook Express.  Customers compose their email messages, add any attachments, click the “Secure” button on the Encrypted Message plug-in toolbar, set their encryption password, and hit “send.”  It’s that easy.   When the recipients receive the message, Encrypted Message will prompt them for the password, and then decrypts the message.  This simple process allows customers to quickly encrypt and decrypt messages without the hassle of managing a security and key infrastructure.

How Secure is it?

Encrypted Message uses standards-based technologies such as Public Key Infrastructure (PKI), S/MIME and X.509 certificates to enable the parties in a dialogue to establish confidentiality, message integrity and user authentication.  This ensures the best commercially available encryption security for your messages.

What attachments does it support?

Encrypted Message can encrypt any MS Office document, .PDF file, image files, and almost any other popular file format.

Please select the document(s) that you want to download and provide your name and email address to access our download library.

Policy-based Email Encryption
Encrypted Email Datasheet

Menu

Zecontech