Email Encryption Solutions – Secure Email – Trend Micro USA

Effortless Key Creation

Unlike other solutions, Trend Micro Email Encryption features dynamic key generation, built with Trend Micro Private Post technology, eliminating the pre-enrollment and certificate management hassles of PKI encryption. All you need is a recipients email address to create encryption keys.

Hosted key management helps ensure the availability of encryption keys 24x7, providing password and key recovery without the need for IT involvement.

Our web-based Zero Download Reader enables your intended recipients to decrypt emails without requiring them to install client software and supports popular mobile devices running iOS, Android, and Blackberry. Plus, our solutions help you comply with the regulations and requirements of partners and customers by allowing you to secure both incoming and outgoing emails and attachments.

Our email encryption solutions minimize IT administration and lower overall costs thanks to all of the above: effortless key creation, hosted key management, plus ease of use for both senders and recipients.

Read analyst TCO white paper

Trend Micro Email Encryption saves time vs. PKI encryption Read analyst TCO white paper

Our client-based encryption plugs into Microsoft Outlook, making it easier for end users to select which emails should be encrypted. Secure, encrypted email is as simple as sending regular emailno special training is needed.

Free trial View datasheet

Compatible Operating Systems

CPU and Memory

Required Disk Space

Compatible Web Browsers

Compatible Email Clients

Compatible Smart Phone Operating Systems for Zero Download Reader

In my opinion, Trend Micro Endpoint Encryption should be considered an industry standard for data encryption in healthcare. As an IT leader, when you find a tool that works so wellyou keep [it] in your tool-box indefinitely. Rob Jones, Chief Technology Officer, Truman Medical Centers Read more (PDF)

This option for InterScan Messaging Security, automatically encrypts email at the gateway based on content policiesfor a critical layer of data protection that doesnt rely on end user discretion. A recipients email address is all thats needed to create encryption keys, lifting the burden from IT staff.

Free trialView datasheet

Its faster to deploy and easier to manage

Its become a necessity See analyst white paper

Policy-based encryption from Trend Micro automatically enforces compliance requirements and protects confidential informationall while minimizing administration and lowering TCO. This service integrates seamlessly with Trend Micro Hosted Email Securityfor comprehensive messaging security in a fully hosted solution.

Free trial View datasheet

As a hosted service, Trend Micro Hosted Email Security does not require additional hardware or software located on your premises since all scanning hardware and software is operated and maintained offsite at Trend Micros secure datacenters.

To access your local Hosted Email Security administration account, a personal computer with Internet access and either Microsoft Internet Explorer 6.0 or 7.0 , or Mozilla Firefox 2.0, and JavaScript and Sun Java Runtime Environment (JRE) 1.4 or higher is required.

To start using Hosted Email Security, environments must also have an existing Internet gateway or workgroup SMTP connection and access to the DNS mail exchange record required to redirect the MX mail host record. If you have hosted email, then contact your service provider for more information or configuration help in redirecting your MX record.

Quality Life Services simplifies compliance with Hosted Email Encryption Read case study

Continued here:
Email Encryption Solutions - Secure Email - Trend Micro USA

Related Posts
This entry was posted in $1$s. Bookmark the permalink.