Encrypted e-mail
and file transfer

Making e-mail better!

Secure e-mail and file
transfer for enterprises

Use now for free

CALL: +49 761 38913 0
Local Sales Offices Outside Germany


E-mail has some issues

What are these?

The problem

Can e-mail be improved?

Show me how

The solution

Take action now

Try or buy

Use now

Product choices

Cryptshare for you

Product information

  • The problem domain

    We all use e-mail but it has some issues specifically security is weak, transport size is limited and interaction with third parties often leads to a loss of control. Many solutions have been tried but are either expensive, complex or both.

    Cost

    Security

    Governance

    Usability

    Solutions exist but are complex, expensive and suited better to security between known senders and recipients.

    When forced by policy to use an alternative to e-mail security is very often the first victim.

    Good policy requires control. Bad choices by users create frequent governance risks.  Complexity prohibits ad-hoc use. The best solutions are easy to use in any circumstances.
    Learn more about the choices your staff might make...

     

     

  • Regular e-mail is not secure.

    Since regular e-mail is like a postcard, readable by anybody, you may have chosen a more secure method. However these solutions are more complex and expensive or require recipient side installations.

    Encrypted E-mail

    Secure but very expensive. Never available when you need it. Doesn't solve the problems of large files.

    S-FTP

    Complex to use, time-consuming to set up and operate. May conflict with other infrastructure.

    MFT Solutions

    Secure but complex. Limited for ad-hoc requirements. Expensive.
    Learn moreLearn moreLearn more
  • E-mail was never intended to handle large files.

    Most organisations impose policy limits on e-mail size typically around 20 MB per transaction. Your intended recipient will also have policies which you do not know. When e-mail says "no" which services do your staff choose?

    FTP

    Requires management of user accounts and may be a graveyard for data.

    Cloud Services

    Consumer grade. Places your most sensitive data outside into the "Wild West".

    Removable Media

    Easily lost or stolen. Very likely to turn up during waste disposal.

    Learn moreLearn moreLearn more
  • Good governance demands more than e-mail can offer

    Emerging laws demand that many different types of information are given special protection. Your policies may guide staff to recorded methods of transfer rather than using e-mail.

    Standard Post

    Relatively expensive, very slow and can be easily stolen.

    Courier Services

    Still perceived as safe, but old-fashioned, slow and expensive.

    MFT Solutions

    Expensive and complicated, but works if you are already a user. No ad-hoc capability.
    Learn moreLearn moreLearn more
  • Ease of use is very important

    There is however a balance to be made between ease of use, security and cost. Uncontrolled choices such as use of removable media or consumer grade cloud services will cause significant breaches.

    Removable Media

    Easily lost or stolen. Very likely to turn up during waste disposal.

    E-Mail

    Universally available but insecure and can't handle large files.

    Cloud Services

    Fall far outside normal use policies. Consumer grade security.
    Learn moreLearn moreLearn more

E-mail has some issues

What are these?

The problem

Can e-mail be improved?

Show me how

The solution

Take action now

Try or buy

Use now

Product choices

Cryptshare for you

Product information

  • Cryptshare solves these problems.

     

    With Cryptshare your e-mail becomes the solution.

    Cryptshare was designed from the start to solve the known problems of e-mail in an easy, controlled and secure way. Get a free risk assessment or try Cryptshare immediately.

    Free risk assessment

    Companies have been looking for solutions to these problems for many years and staff have made all manner of choices to protect information or share it with others. Those choices bring differential risks. Click here for your free risk assessment.

  • Encrypt your e-mail and files

    Improve security immediately

    Make both your e-mail and all file attachments, regardless of size, secure when stored and in transit with sophisticated encryption. Making encryption easy to use prevents staff from making poor choices.

    Learn more

    Greater security could be available across your entire e-mail domain one hour from now. Cryptshare is inexpensive and very easy to get started. Customisation of the user front end takes minutes. Use one of our plug-ins to gain greater security for both the e-mail content and files.

    Learn more

  • No more costly file size issues.

    Reducing resource demands on your e-mail server.

    We all create large files in our daily work and we frequently want to send these to or receive them from others. Cryptshare has removed all practical limits to the size of files that can be shared and can operate on a completely ad-hoc basis.

    Learn more

    Even a quick examination of the stored content of an e-mail user will show that a very large part of the typical mail-box storage is filled with file attachments both sent and received. Cryptshare helps massively to reduce the storage demand for each e-mail user.

    Learn more

  • Enhanced control

    Build on what you have

    With Cryptshare each transfer is accompanied by notifications to sender and recipient at each stage in the process so no more excuses. Create and enforce policies and report all transfer activity to ensure compliance with your rules and support any audit procedure.

    Learn more

    By making your e-mail the solution for secure sharing of files and other e-mail content you release the full value of the investment already made in e-mail infrastructure. With Cryptshare the enhancements to e-mail can also be used immediately by all users with no training or special instruction.

    Learn more

  • Simple and intuitive to use

    Use from any device

    Cryptshare requires no training and can be used immediately by anybody familiar with e-mail. The user interface and help functions can be customized to ensure your policies are followed. A further advantage is that Cryptshare can be used directly from a browser with no need for a client installation.

    Learn more

    Increasingly organizations face staff demands for access to files and data from many kinds of devices from iPads and tablets to PDA’s, laptops and home computers. With Cryptshare any device with browser and access to e-mail can be used to send or retrieve files and messages securely.

    Learn more


E-mail has some issues

What are these?

The problem

Can e-mail be improved?

Show me how

The solution

Take action now

Try or buy

Use now

Product choices

Cryptshare for you

Product information

Try now!

There are several simple ways that Cryptshare can be used. Select one of these options to start using Cryptshare now.

Buy now!

Buy Cryptshare right now for a small number of users or if you prefer for your entire domain.


E-mail has some issues

What are these?

The problem

Can e-mail be improved?

Show me how

The solution

Take action now

Try or buy

Use now

Product choices

Cryptshare for you

Product information

  • If you can use e-mail

    you can use Cryptshare

    Cryptshare is as easy to use for you as well as for the person to whom you send files. As one of our customers said ‘if you can use e-mail you can use Cryptshare’. There are several options for using Cryptshare. The choice is up to you. But as a minimum all you need is an e-mail account and a browser, there are no user accounts or complex set-up procedures.

    Basic installation Cryptshare for Outlook Cryptshare for Notes Automated file transfer

  • Cryptshare web application

    The core of the Cryptshare system is the Cryptshare server inside your DMZ (or externally hosted). Its web frontend can be used from any device - fixed or mobile - at any time without user account or extra administration.

    It is very easy to use for communication with your external business partners in both directions. The self-explanatory front end is completely intuitive to use.

    Your Cryptshare server is also the core module if you decide to extend your Cryptshare system with e-mail integration or other automation modules.

     
    How to use How to implement System requirements

  • Cryptshare for Microsoft Outlook

    Cryptshare for Outlook is a plug-in for Microsoft Outlook that automatically connects to your Cryptshare server.

    Cryptshare for Outlook enables you to encrypt both the e-mail content as well as the attachments securing both.

    Sending secure or large messages from Outlook is just one mouse click away.
     
    How to use How to implement System requirements

  • Cryptshare for IBM Notes

    Cryptshare adds even more value with the Lotus Notes Add-on

    By offering Cryptshare directly inside the primary office tool used by your staff you will significantly increase the use and benefits of Cryptshare.

    By setting up rules you can ensure that certain contents sent by Notes users are handeled automatically by Cryptshare.

    In addition you can provide Cryptshare functionality with just one mouse click in the Notes Client so your users are encouraged to employ Cryptshare more often and so gain benefits from easy access to the large file handling and high security available to them.

     
    How to use How to implementHow to implement System requirements

  • Automated transfers via Cryptshare

    Automate your file transfers for single or mass distribution, one to many or many to many. Using the Cryptshare APIs or Robot file transfers can take place as time-triggered or event-triggered actions to single recipients or to distribution lists, depending on your requirements. With these tools Cryptshare is used in wide variety of ways such as distributing commercial materials, statements of account, batch clinical records, contract changes and so on. When large volumes of data need to be sent, but security and compliance issues exist, Cryptshare's automation options solve these issues.

     
    How to use How to implement System requirements

Scroll up