Email Encryption

Last Updated on 12 Feb. 2014, Total: 14 Products

Email encryption

  1. Galaxkey Email Encryption

    Galaxkey is a secure collaboration platform. Galaxkey offers simple to use email and document encryption. Our aim to enable our users to easily encrypt all data exchange and collaboration including voice, video, email, chat, documents. Used by fortune 100 companies, celebrities, journalists and all those who value their data. If you value your data and privacy use Galaxkey... Read More

  2. CenturionMail

    CenturionMail 3.03 is a powerful yet easy-to-use security program for encrypting e-mails as well as files/folders. CenturionMail uses self-decrypting technology so your recipient needs nothing to open the encrypted email except the password. Microsoft Outlook integration and administrator control tools make this the perfect email encryption software for companies... Read More

  3. NetXtremeMail Components

    NetXtremeMail .NET component allows you to retrieve, create, load, process save and send mails using an easy-to-use interface. It supports POP3, IMAP and SMTP... Read More

  4. Trend Micro™ Encryption

    Trend Micro offers both gateway policy- and client-based encryption. Trend Micro Encryption for Email Gateway automatically protects sensitive content with no end user involvement, while Trend Micro Encryption for Email Client plugs into Microsoft® Outlook® for user-designated encryption of specific emails. For businesses looking to move their messaging security into the cloud, Hosted Email Encryption is an add-on service to... Read More

  5. ZixCorp Email Encryption Services

    ZixCorp email encryption services focus on both the sender and receiver experience. If recipients have ZixGateway, emails are automatically decrypted at the perimeter of the network, and emails are received transparently, without the need for passwords or extra steps. They receive encrypted email just like any other email. For recipients that do not have email encryption services, ZixCorp provides secure,... Read More

  6. MilsMail

    MilsMail provides MS Outlook users with the means to protect their e-mails against all threats - through encryption, authentication and access control. Realized as a security plug-in for MS Outlook, MilsMail allows you to work in your familiar e-mail environment while protecting your e-mails at the highest security level. MilsMail can be installed on any Windows personal computer with MS... Read More

  7. Secure File Transfer

    Biscom Delivery Server (BDS) is an enterprise secure file transfer (SFT) solution that enables users to send files, documents, and messages securely while maintaining a complete transaction and audit trail. Business benefits include fewer help desk calls to support FTP, elimination of email attachment issues, reduced overnight delivery service costs, and faster, more secure delivery of critical documents and files... Read More

  8. GNU Anubis

    GNU Anubis is an SMTP message submission daemon. It represents an intermediate layer between mail user agent (MUA) and mail transport agent (MTA), receiving messages from the MUA, applying to them a set of predefined changes and finally inserting modified messages into an MTA routing network. The set of changes applied to a message is configurable on a system-wide and... Read More

  9. Secure Hive

    Secure Hive is a tool for secure archiving and sharing of files. It enables you to create encrypted archives and self-extracting .exe files for secure storage and file sharing. It also includes a means of encrypting parts of, or entire, documents, email messages, etc. Secure Hive offers the enterprise a method of: Securing sensitive documents; Protecting information during transfer; Securing... Read More

  10. GNU Privacy Guard

    GnuPG itself is a commandline tool without any graphical stuff. It is the real crypto engine which can be used directly from a command prompt, from shell scripts or by other programs. Therefore it can be considered as a backend for other applications. Features include: Full replacement of PGP; Does not use any patented algorithms; GPLed, written from scratch; Can... Read More