Automatic encryption of employee emails

Automatic encryption of end-user emails

Share post

The updated version of Tresorit Email Encryption allows IT administrators to set rules for automatically encrypting employee emails. This increases security for email content and attachments with just one click.

Tresorit has announced the launch of the updated version of Tresorit Email Encryption. The solution for increased email security enables organizations, among other things, to automatically encrypt their end users' email messages and attachments. Furthermore, there is the first function package for the desktop application of Microsoft Outlook - a Mac and browser application should be available soon.

Tresorit Email Encryption 2.0: What's new?

With the second version of Tresorit Email Encryption, IT administrators can now define email encryption rules for end users. This enables organizations to meet regulatory requirements and regain control over the transfer of business-critical data via email. Administrators minimize the risk of human error by automatically encrypting emails based on their own rules - depending on whether the recipient is trusted or the message contains an attachment.

In addition, Tresorit wants to simplify workflows for end users: Because they no longer have to activate or deactivate encryption. The system itself performs the encryption. In addition, encrypted attachments can be managed via a separate secure user interface. Users can send and receive attachments up to five gigabytes in size without receiving any alerts in Outlook.

Secure exchange of business-critical data

"The new version of Tresorit E-Mail Encryption is the result of received user feedback, which we have directly processed into urgent additional functions," explains István Lám, Managing Director and co-founder of Tresorit. "With Tresorit's end-to-end encrypted emails, the secure exchange of, for example, patient data and annual financial statements or information that falls under the attorney-client privilege is never at the expense of user-friendliness."

Tresorit will continue to improve the rules for email encryption based on customer feedback and internal product security guidelines (e.g. zero-knowledge protocols). The further developments planned for the future also include encryption, which takes place automatically when certain terms and data types are used, for example.

More at Tresorit.com

 


About Tresorit

Tresorit is an end-to-end encrypted productivity solution for highly secure collaboration that ensures file management, storage, synchronization and transfer. More than 10.000 organizations are already using Tresorit to protect their business-critical data and securely share information.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more