Today, companies are confronted with an ever-increasing volume of electronic communication. Messages and files containing sensitive information need to be exchanged securely and conveniently around the globe.
Consumer platforms and apps, mostly financed through collection of data and advertising, steadily grow and extend their reach.
Meanwhile, organisations see themselves confronted with multiple challenges and threats: Criminals, competitors, and foreign governments want to get hold of their sensitive data.
Why most companies need encryption
In order to protect businesses and their clients, laws, regulations, and internal compliance standards must be adhered to. Examples include the Australian Privacy Principles (APPs) and The European EU Data Protection Directive 95/46/E that is expected to be replaced soon by the General Data Protection Regulation (GDPR). Aside from general regulations there are also topic- and industry-specific laws like the US Health Insurance Portability and Accountability Act (HIPAA) which ensures that patient data are handled in a secure way, or the Consumer Financial Protection Bureau (CFPB) which regulates the privacy of clients in industries like real estate. While these are only a few examples, they are part of an increasing trend that will include more laws and specific regulations to come.
Still, some companies resist email encryption.
Employees are used to the convenience of consumer grade technologies - tools that rarely comply with carefully established security standards and privacy regulations. Also, currently available technologies for encryption like S/MIME and PGP are often too complicated to install and use, and leave metadata vulnerable without solving the problem of exchanging large file attachments. The existing enterprise solutions that try to resolve these issues are generally complex and expensive.
Advantages of email encryption with Cryptshare
- Encryption of email
- No size limit for transfer of files
- Documentation of all activity for compliance
- No user accounts needed
- No exchange of certificates needed
- No software installation needed
- All stored files encrypted
- Encrypted transfer of files
- LDAP Integration
- Customizable user interface design
- MS Outlook Integration
- IBM Notes Integration
- Low operating effort
Email Pros and Cons
Click on the panels to learn more
Universally available but insecure and can't handle large files. Click on the following panels to learn more.
Email is the backbone of communication in most companies. Since it's established, effective, and paid for, it is unlikely to change . Large data stores for each user drive higher and higher costs, while established policies are often breached for the sake of convenience.
Unless supplemented by expensive and complex encryption email is not secure. Beyond enterprise boundaries, loss of confidential information in email is one of the most common security and compliance breaches.
Good governance demands better security than email alone can provide. Any data more sensitive than a simple message requires the protection of encryption.
Email's simplicity is both its strength and its weakness. There's a reason we all use it all the time. Its ubiquity, however, can gives us a false sense of security, especially, when we use it to transfer the wrong kind of information.
Encrypted email (PGP & S/MIME)
Secure but expensive. Never available when you need it. Doesn't solve the problems of large files.
Complex and expensive and suited better to security between known senders and recipients encrypted e-mail is very expensive to buy to install to administer and to run. Whilst the cost is high there is no doubt of the strength of security offered albeit with lost flexibility.
Encryption of e-mails and file attachments is end to end and so highly secure. By not helping the ad hoc transfers there is a risk of breach by use of removable media when this demand arises.
Because of the high cost, inflexibility and slow execution encrypted e-mail is often not deployed in favor of greater flexibility. In particular the fact of needing a client to exchange files creates a significant weakness as real world needs extend into third party companies.
For the user inside the domain ecrypted email is simple to use once set up. However if the requirement is to exchange files or e-mails beyond the firewall things are not so easy. Furthermore first set up is very complex and time consuming.
How email encryption works with Cryptshare:
A short animation
About "E-mail encryption"
German energy suppliers have been declared as operators of critical infrastructures since the summer of 2015. According to the IT-Security Law they must send data via a secure connection.
A newly discovered weak spot in the technology used to deliver cloud services enables criminals and governments to access information stored and processed in the cloud.