Euro SecurityEuro Security InternationalMiddle East Security
In this issue

(titel, termin, news)

Looking for a supplier? Please enter the supplier name below:

Z1 SecureMail End2End makes email hacking a futile exercise Print E-mail
Sunday, 28 June 2015 15:59
The hacking attack on the German parliament in May, showed clearly that simply protecting emails with firewalls and transport layer encryption is not enough and not nearly as secure as encrypting the message content itself. According to a report in "Spiegel Online", the hackers managed to grab 16 Gigabytes of data from 15 members of parliament. The hackers targeted Outlook data and stole address book & and calendar entries as well as all the emails and attachments from the MPs. It cannot be assumed that any of this data was encrypted.
Company-wide email security is often based on the premise, that the network firewall will provide sufficient security. Emails are therefore usually stored on servers and clients in plain text without any encryption. Any hackers who can make it through the firewall can simply help themselves to whatever they find. The Berlin based IT security company Zertificon delivers a robust solution with the recent development of its Z1 SecureMail End2End product. Instead of leaving emails lying around in plain text for anyone who enters the network to read, Zertificon’s end-to-end encryption solution ensures that emails are encrypted within the company network whilst they are being transmitted and when they are stored on servers or client devices. Hacking attacks are futile and even cyber spies cannot get at the email content.
The established Z1 SecureMail Gateway from Zertificon has been successfully protecting email communication over the Internet for over 10 years. The latest innovation with Z1 SecureMail End2End offers extra protection within the internal company network. Zertificon’s extensive experience and close development with clients has resulted in a solution which is simple for end users to use. Any email can be simply encrypted even if the recipients don’t have special security software or decryption programs installed.
Last Updated on Monday, 29 June 2015 08:37

User Rating:   / 0


Subscribe to our newsletter to receive the latest news/updates: