Business damages caused by industrial espionage or business e-mail compromise (CEO fraud) can cost millions per incident. You must reduce these risks by signing and encrypting e-mails appropriately!
Standard applications like Outlook or iOS mail provide seamless S/MIME end-to-end encryption directly on the user device. Eavesdropping of a message with end to end encryption is even not possible for intelligence agencies. At the same time a digital signature can prove the origin and authenticity of the message.
Alternative technologies like secure e-mail gateways undermine the end-to-end encryption at the expense of security because e-mails are decrypted and re-encrypted here on their route.
S/MIME certificates from an internal Microsoft CA will not be accepted by your partners for encryption nor for validating digital signatures. This leads also to internal rejection of using secure e-mails.
A user's S/MIME certificate is often only installed on his desktop computer. He will not ne able to decrypt and read incomning mails or send encrypted and sigend e-mails on his mobile devices.
Manual enrollment and renewal of trusted S/MIME certificates from a public CA will dissatisfy users and will cost time and money.
For encryption the certificates of the recipients are needed. Acquiring and installing them manually is a barrier for most users.
Native Windows autoenrollment or central autoenrollment of S/MIME certificates from a public CA of your choice. Optional auto-revocation for retired users or changed addresses.
Secure automatic provisioning of S/MIME certificates and private keys to all MDM-managed or even unmanaged devices of a user.
Private user keys are securely archived and can be recovered for distribution purposes or in case of loss of keys. The organisation is able to decrypt data even from retired users in order to comply with regulations.
Secure publishing of your user's S/MIME certificates to your partners and automatic discovery and retrieval of external recipient certificates for instant outbound encryption.
Secardeo TOPKI provides software components that serve for specific management tasks for S/MIME certificates in end-to-end encryption scenarios. TOPKI enables a seamless adoption of managed PKI services from public CAs in the cloud. The public S/MIME certificates can be enrolled by using native Windows autoenrollment or by using a central autoenrollment. Certificates and private keys can automatically and securely be distributed to all devices of a user including managed or unmanaged mobile devices. The certificates of internal users can securely be published for inbound encryption by external partners. Recipient certificates will be retrieved automatically for outbound encryption with standard apps like Outlook or native mobile mail apps.
Certificate Directory Server for securely publishing internal S/MIME certificates and retrieving external certificates globally.
Certificate Enrollment Proxy for native Windows certificate autoenrollment from non-Microsoft CAs on-premise or in the Cloud.
Service for certificate lifecycle management, discovery, central autoenrollment, self-services, notifications and REST API.
Key Recovery and Distribution service for provisioning user keys from a central key archive to mobile or MDM-managed devices.
© 2024 Secardeo GmbH.
All rights reserved.