The first list covers the group of products where you control the decryption key and the email provider cannot easily read your stored emails without your password.
Of course, if you loose your password and reset it, access to your past emails is lost. The second list covers products where encryption is automatically managed for you. You can reset your password and need not backup any encryption keys. However, the email provider has full access to your data.
Among the free options, considering ease of use, the top two contenders are Safe-Mail. All others require purchasing a paid tier because either they do not offer a free tier or, for SendInc, the free tier does not save messages beyond 7 days making it impractical for most use cases. If choosing a paid product, the exact decision will depend on which features are most relevant for your scenario.
MDOfficeMail and Encyro seem to stand out because they allow your clients to send you secure messages without signing up for any new account. NeoCertified also offers the same feature but at a steep price. Updated Jan 30, to update changed external links. Why Encrypt Email? What not to do There are different types of email encryption as explained in this Encyro article : TLS, enterprise email encryption, do-it-yourself DIY encryption, and secure webmail The first three are not recommended for small business use.
The Practical Approach: Secure Webmail A realistic option for most small businesses is to use one of many encrypted webmail services. Only You Can Decrypt For the email encryption services where even the email provider does not have access to your encryption key, the big advantage is that even they cannot easily decrypt your email on the backend. However, you should be aware of two risks: While this option is more secure that using the key on the email provider's server, it also relies on trusting the email provider's software running on your device.
In the past, there have been cases, where in response to law enforcement requests, the email provider used a backdoor in their software running on the user's device to obtain the private key even though the key was never stored on the email provider's server. The location of the email provider's organization and their servers can impact which law enforcement agency they must respond to. You must backup your key reliably and securely.
Since the key is stored only on your device s , if you lose your device or if it malfunctions, all your past email could be lost unless you have a backup of your private key. Hushmail recently introduced a change where it does allow you to send a secure message to non-Hushmail users without having to communicate a separate secret passphrase to them. However, the recipient is forced to create a Hushmail account to read your message.
With SecureMyEmail, you must ask the recipient to install specific software and create an account. Automatic Encryption The other category of encrypted webmail, where the encryption keys are automatically managed for you, is the one we recommend for small business use. The differences among the products in this category are mostly in terms of: how easy it is for your recipient to open your email, how easy it is for them to send you an encrypted email a new email or a reply to your email , pricing, and other features such as storage limits, attachment sizes, and mobile access.
MDOfficeMail optionally allows enforcing an additional passphrase that you must provide your recipients outside of email. Such messages expire to keep them safe. Encyro: Recipients simply click a link in their email to access your message without any account sign up. The message expires after a set time to keep it secure. Optionally, the recipient may sign up for a free account simply by entering a password if they wish to retain indefinite access to their message. To minimize friction, the sign-up option is offered after your recipient has already retrieved the message.
Without that add-on service, recipients must create an account free that they can use only to reply to your message but not to send any new messages to others. The whole MDOfficeMail website is geared for doctors or medical facilities and if your business does not fall in that category, certain messaging can be confusing for your clients. Encyro provides you with a customized upload page where anyone can send you a message. For instance, you could include the upload page link in your email signature or message and any client may use it.
The upload page is customized with your brand and does not require senders to remember or manually type your email address. The upload page can be used by any number of different clients and the received messages stay organized by client. Moreover, the branding on the upload page can be set automatically to match your business logo colors. For the others SendInc, Safe-Mail.
SendInc offers a free tier that only stores messages for 7 days and limits inbox size to 0. More practical accounts, with 0. Encyro offers a free account without restrictions on storage size or time limit for how long the messages are stored subject to abusive usage policy. The free account allows your recipients to send you secure messages as well through their own free account. NeoCertified does not mention backup explicitly but they do claim to meet certain compliance requirements for their data center, and local backups are required as part of those requirements.
They do not provide information on the use of multi-location backups. Encyro backs up data within each data center and maintains a backup of all your data including messages, attachments and contacts at a remote location, hundreds of miles away from the primary data center.
SendInc, Safe-mail. SendInc's privacy policy seems to point to a different company's privacy policy. Summary Let us summarize the comparison for all products. Countermail Pros Email service provider cannot decrypt your messages. Gives you the option to NOT store your key on their server, so all decryption happens on your computer only Countermail servers do not get your key even when you login.
Located in Sweden - not subject to US court orders Additional login security through optional USB key Minimized cookies and IP logging for enhanced privacy Allows payment using Bitcoin or prepaid cards, to avoid revealing your credit card related personal information.
Custom domain supported email to non-Countermail users is not be encrypted, so custom domain based email address can be confusing for others to distinguish if your email is secure or not Cons Only encrypts to other Countermail users. Manual key transfer and special app installation required. Data center in Sweden - slower to access from the U. Hushmail Pros Email service provider cannot normally decrypt your messages.
Your decryption key is stored encrypted on Hushmail servers and your password is needed to decrypt it. However, Hushmail servers do have access to your key when you login. Lockbin Pros Email service provider cannot normally decrypt your messages Encryption uses your password, and that is not stored by Lockbin. Note: Using a password for encryption is not as secure as using a true cryptographic encryption key.
Lockbin does store a private key that can be used to access your email , though your password is required to retrieve it. Located in the U. Generous mailbox storage in paid accounts no pre-set limit. Cons If recipient is not a Lockbin user, they must create a Lockbin account to receive or you need to communicate a secret pass-phrase to your recipient outside of email. All past email lost if you forget your password as described in their FAQ: Can you see my messages.
Free tier account does not store messages older than 6 months. Mobile access may be limited to Android as no app provided for iOS. ProtonMail Pros Email service provider cannot normally decrypt your messages. Your key is stored encrypted on ProtonMail servers and can only be decrypted after you enter your password.
ProtonMail does have access to your key when you login. Located in Switzerland, not subject to U. Offers free tier with 0. Custom domains supported in ProtonMail for Business Cons All past email lost if you forget your password. Sending to non-ProtonMail users requires communicating a secret password to recipient outside of email.
Data centers in Switzerland - slower to access from the U. SecureMyEmail Pros Email provider cannot read your email. Your key is stored only on your device and not sent to SecureMyEmail servers. Works with custom domains, and your existing email address Cons You must install special software to use it. No webmail access. Egress is trusted by enterprise organizations and governments around the globe.
The platform offers email and document classification, accidental send prevention, email encryption, secure online collaboration, audit, and compliance reporting. Egress Email Encryption provides easy encrypted email communication. Users can secure emails with one-click; send large files securely by surpassing file size restrictions with complete control over who has access; revoke further access to any content the user sent; and avoid data breaches and fix errors. Egress Email Encryption covers functions for real-time control sharing sensitive data, Egress smart authentication, and flexible hosting options for secure mail infrastructure.
Egress provides diverse pricing plans depending on the number of software users. However, for business packs of 20, customers are advised to contact the vendor. Protect, share and control are the main factors that could describe Virtru Email Encryption solution.
The on-demand encryption solution ensures smooth navigation and enhances security awareness for its users. Virtru permits its customers to revoke, expire and track or disable forwarding—even after the messages have been read and forwarded so the users never lose control of their sensitive information.
Another feature of the product is its centralized enterprise policy management. This allows its users to set, enforce and report on DLP policies also known as email transport rules in an incorporated administrative console. The software also grants its users to quickly see where the emails and files have been shared, whether it is inside or outside the organization. Additionally, custumer-hosted keys give the users complete control over protected content.
This prevents unauthorized access and blind government subpoenas. VMware developed a faster and smarter mobile inbox that can be easily configured by its users.
It has tools such as custom swipe gestures and quick-reply templates, quick sharing of calendar availability and more. Workspace ONE Boxer is an efficient way to manage emails. The application offers a consumer-centric focus on mobile efficiency with AES bit encryption.
Boxer has configurable swipe gestures that allow its users to tailor email experience for fast management on-the-go. Likewise, one of its features makes use of templates to quickly respond to emails. It also lets its users send their availability within the time of the month or year using the calendar.
The application is free of charge. Folder Lock offers password-protected files, folders, and drives; file encryption and real-time backup; portable driver security; and files and drives shredding and history cleaning.
The software is the most downloaded file-security application. It has 45 million users. The software can lock and hide files and folders within a short span of seconds. It allows its users to protect their files with password and confidentiality features. This feature does not only secure the files from a data breach but also from loss or damage. Folder Lock also makes use of password wallets where digital wallets can be created to secure confidential financial information.
This information is automatically encrypted when saved. The shredding feature allows users to permanently delete files and folders that results to non-recovery. It provides individuals and small organizations with encryption solutions that are easier to navigate. Axcrypt aims to remove the complexity from the utilization of strong and proven cryptographic technology. The software provides strong security with bit encryption. It is the most standardized encryption available and mostly used for top secret information all over the world.
In sharing a protected file made from the AxCrypt software, the recipient only needs a free AxCrypt ID and will be invited via email. The invitation email contains directions with regards to viewing and editing the file.
AxCrypt is available for free with very minimal to no features but viewing. Sendinc guarantees that emails delivered through their service are encrypted to the highest standards. It requires no software for its customers. Any existing email address can be used upon registration. Sendinc does not store encryption keys, ensuring that emails are only decrypted by the recipients.
The service allows its users to send emails and attachments with up to 10 MB. Sendinc operates on bit SSL encryption. The messages are automatically deleted 7 days after sending on free accounts.
However, in order for the recipients to view the encrypted email, they need to sign up to Sendinc. The service operates without any downloadable software. This is beneficial for users to send secure emails from any device. The service is available for free with limited features.
There are many tools that you can use to help beef up your online security, but if you have to send personal information via email such as private health information, mobile phone numbers, or credit card information , one of the easiest protections you can take is encrypting your email.
Many email servers have plug-ins that let you encrypt your email, and there are many tools on the market that have features and encryption methods to help keep your communication secure. You can use it with a plugin, an app, or a web-based interface. SafeGmail is a Chrome extension you can install that automatically encrypts incoming and outgoing messages from your email.
Zixmail also has word filters that trigger encryption. There are many email encryption tools on the market.
0コメント