Secure Outbound Email Solutions

Defence from malicious code, phishing, spoofing and man-in-the-middle attacks

Control intentional & unintentional information leakage

Support Cryptographic and Electronic Messaging Protection Controls

Confidential Mail System

Apply PKI email encryption

 

Classify email into security levels and apply corresponding protections:​

 

  • Attachment protected by one time password

  • Email sent a link with one-time passcode.

  • Certificate signed and encrypted mail 

 

Crypto Client: Microsoft Outlook or IBM Notes plug-in, supporting sign, encrypt and decrypt operation. 

Support mobile app to send and open restricted / confidential mail on the road.

ecm.png

Email Compliance Manager

An intelligent email compliance engine to to protect, control and monitor sensitive and confidential email. 

Define rules to implement security controls according to email attributes such as subject, attachment format, file name & sender & recipient .

Controls include mail blockage, routing, copying, encryption, altering, retention and audit logging.

22.png

Email Audit Trial

360 degree monitor email security activities and breach.

 

Include Mail, Database, Directory, User login activities & ACL.

Detect and instant alert intrusion and malicious events against highly confidential email on top of audit trial reports.

EMAIL COMPLIANCE MANAGER

Proven Secure Email Solution

Best for Government, law enforcement, Banking & Finance, Legal, Health Care to protect Privacy and Confidentiality to meet Compliance

 

Search & Discovery

MAIL RENTENTION 

  • Archive & backup email into Email Compliance Manager server

  • Support multiple database (each key account or partner can have one database)

  • Set access control list to each database

  • Search engine  - search by sender, recipient, subject, date, key words or self-define field

Intentionally & Unintentionally Information leakage

MAIL BLOCKAGE

1) Define email policies

  • e.g. Back office staff cannot send email to external parties

  • e.g. Specific role of staff cannot communicate with each other.  i.e. Team A cannot send email to Team B

  • Monitor email sender, recipient, subject, attachment name or attachment file format

2) System automatically triggers actions

  • Block the email that breaks the defined rules

  • Forward prohibited

  • Send email alert to specific person such as supervisor

  • Trace who has read the email

Large Email Attachment

MAIL PROTECT

  • Sender sends large email attachment as a  hyperlink

  • System automatically generate dynamic password for each link

  • Recipient receives link & password separately

Sending Sensitive Information 

MAIL PROTECT

  • Apply protection on each level:

    • Level 1: Send outbound email attachment in form of a one time password protected ZIP file

    • Level 2 : Send outbound email as a password protected link

    • Level 3: Send outbound email with digital signature 

Non Repudiation | Electronic Transactions Ordinance 

MAIL CRYPTO

  • Apply Public Key Infrastructure technology to meet higher security control

  • Send email with digital signature and data encryption including attachment

  • Auto decryption and signature verification down to verification of CRL and trusted CA

  • Identify email with outdated / revoked certificates

©2018 by Trusted Systems Limited | Privacy Statement | Terms of Use