{"id":3999,"date":"2020-10-05T09:47:17","date_gmt":"2020-10-05T13:47:17","guid":{"rendered":"https:\/\/www.exchangedefender.com\/blog\/?p=3999"},"modified":"2020-10-05T09:50:57","modified_gmt":"2020-10-05T13:50:57","slug":"email-encryption-how-you-handle-sensitive-information","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2020\/10\/email-encryption-how-you-handle-sensitive-information\/","title":{"rendered":"Email Encryption: How you handle sensitive information"},"content":{"rendered":"\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/09\/Your-safety-is-our-concern-12-1024x683.png\" alt=\"\" class=\"wp-image-4018\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/09\/Your-safety-is-our-concern-12-1024x683.png 1024w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/09\/Your-safety-is-our-concern-12-300x200.png 300w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/09\/Your-safety-is-our-concern-12-768x512.png 768w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/09\/Your-safety-is-our-concern-12.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>ExchangeDefender Email Encryption is a service that helps\nyou control and distribute sensitive information. There is no shortage of\nsolutions that help comply with the alphabet soup of regulatory requirements\nthat help mitigate data leakage &#8211; the real challenge is making people that rely\non encryption to be more productive. <\/p>\n\n\n\n<p>We spoke to thousands of our users, across industries, to gain understanding for how they use the service and what would make it optimal. <strong>Here is their wishlist, delivered<\/strong>:<\/p>\n\n\n\n<div style=\"height:26px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Encrypted Messages are about more than email<\/h4>\n\n\n\n<p>While Email Encryption services were designed to automate encryption of email that contained sensitive information, the practical use for email encryption is simply to securely deliver and track access of those messages. Depending on the urgency, sensitivity and the receiving party, ExchangeDefender\u2019s Advanced Encryption Options make it possible to customize how long the message is available for, if the recipient needs to enroll in the service or simply click to view, who should be notified of message delivery\/receipt\/read status, and more. <\/p>\n\n\n\n<p>ExchangeDefender is the only Email Encryption solution to\nfeature multi-channel delivery of sensitive content. Simply put, organizations\nno longer only share data via email. Companies are now texting more than ever,\nas well as leveraging different portal and chat solutions to which sensitive\ncontent can be attached. ExchangeDefender enables you to send encrypted\nmessages \u2013 automatically based on content or by your custom preference &#8211;&nbsp; but you can send it as an email, as an\nSMS\/text message to a mobile phone, or as a URL link pasted on\nFacebook\/Slack\/Teams or any web or social media property. <\/p>\n\n\n\n<p>Simply put, when you need to know that it got there securely and what they did with it afterwards, ExchangeDefender has the policies, processes, and automation to make it possible and simple.<\/p>\n\n\n\n<div style=\"height:28px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Encryption isn\u2019t an IT \/ CCO problem, it\u2019s a business challenge<\/h4>\n\n\n\n<p>No software to install. No need to change any DNS records or move your email hosting. No devices or appliances to maintain or support. It takes just a few minutes to sign up for ExchangeDefender Corporate Encryption, add your users, and set the default corporate encryption policy and suggested lexicons\/pattern searches to keep everyone secure. In minutes, IT\u2019s job is done.<\/p>\n\n\n\n<p>The real encryption challenge is with the people that rely on encryption to get things done. Staff that sends out hundreds of encrypted medical records each day. Staff that communicates sensitive financial information between multiple organizations. Staff that is more concerned about the message getting to the intended recipient that can easily access it \u2013 or they become the front line IT support for every recipient that can\u2019t view the message, didn\u2019t get the message, or worst case scenario, message was sent to the wrong party (you can revoke it at any time).<\/p>\n\n\n\n<p>ExchangeDefender approaches the business challenge by helping the sender customize the environment and save settings to eliminate repetitive work.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Outlook or Outlook Web App<\/h4>\n\n\n\n<p>ExchangeDefender Corporate Encryption comes with an Outlook and OWA add-in product that adds buttons to the Outlook\/OWA ribbon. Safe delivery of sensitive information is really just a click away: just click on encrypt. This approach removes the need for the web interface entirely, and follows the default encryption policy as defined by your IT and Chief Compliance Officer. <\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Activity<\/h4>\n\n\n\n<p>Most of encrypted email work is related to message delivery:\nWhen you want to know that they got the message and what they did with it. With\ntraditional offerings this is a painful process of searching through tons of\nemail notifications \u2013 but ExchangeDefender takes that a few steps forward.<\/p>\n\n\n\n<p>ExchangeDefender Corporate Encryption features a powerful\nActivity tab that enables users to see live activity across all the messages\nthey\u2019ve sent recently. For example, if you\u2019d like to know whether the recipient\nattempted to print or forward a message you restricted them from printing or\nforwarding, you\u2019ll find an alert on the Activity page. If you send a ton of\nmail, our powerful search will help you define the actions you\u2019re looking for,\nsearch for a specific time period, or just search by text\/subject. From there\nyou can export it to Excel, PDF, CSV, or just print out the report. <\/p>\n\n\n\n<p>If you don\u2019t send a lot of messages or dislike constant email notifications from encryption services, we\u2019ve got you covered as well. ExchangeDefender features a weekly email report that shows you all the messages you sent and the associated activity. <\/p>\n\n\n\n<div style=\"height:26px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Management Default Policies<\/h4>\n\n\n\n<p>ExchangeDefender makes it really simple to define a corporate security policy that automates the encryption of sensitive information. Whether you want to screen for standard personally identifiable information (PII), or use one of the predefined lexicons for a number of industries, or you want to define a default corporate policy to keep all users secure, ExchangeDefender has you covered.<\/p>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Sender Policies<\/h4>\n\n\n\n<p>ExchangeDefender keeps its users productive by eliminating the user interface clutter \u2013 a byproduct of a highly flexible and customizable interface. Sending an encrypted message is simple and requires no training by design, the entire process is obvious and intuitive. <\/p>\n\n\n\n<p>To be productive, you will need to rely on some of the more advanced features of ExchangeDefender Encryption that help control notifications, message rights, message age, and additional security requirements. ExchangeDefender allows you to save your policy customizations as a new policy, so that all the settings you configured can be reused and reapplied with just one click, on demand.  <\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">The Encryption Opportunity <\/h4>\n\n\n\n<p>The purpose of email encryption is to help automate the\nencryption of sensitive information. ExchangeDefender excels at this\nrequirement with domain policies, lexicons, advanced pattern searches, and\ncustom policies.<\/p>\n\n\n\n<p>There is a lot more to encryption when you consider the\npeople that rely on it to do their job \u2013 and ExchangeDefender offers\nOutlook\/OWA addins to make encrypted email as simple as a mouse click. From\nthere we provide powerful Activity reports in the encryption portal that allows\nyou to search for messages, activities, and even filter down to the right time\nframe. Because encryption isn\u2019t only about sending \u2013 it\u2019s about knowing that\nthe message was received securely \u2013 you can create custom reports that can be\nprinted, saved, or exported to Excel.<\/p>\n\n\n\n<p>Ultimate opportunity is in realizing that message encryption\nneeds to evolve with how we work. Covid-19, office closures, physical\ndistancing, and reducing touch points has made us all rely on social media,\nchat platforms, portals, and social media to communicate with our coworkers,\npartners, and clients. We now share sensitive information via email but also\nover the web and via text\/sms to mobile devices. ExchangeDefender supports them\nall, secures them all, and enables secure productivity.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator is-style-dots\"\/>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">It\u2019s easy to see why Corporate Encryption is our most popular product, <strong><a href=\"http:\/\/support.ownwebnow.com\"><em>please submit a ticket<\/em><\/a><em> <\/em> <\/strong>for a free trial. <\/h3>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,48],"tags":[97],"class_list":["post-3999","post","type-post","status-publish","format-standard","hentry","category-uncategorized","category-security","tag-corporate-encryption"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=3999"}],"version-history":[{"count":20,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3999\/revisions"}],"predecessor-version":[{"id":4038,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3999\/revisions\/4038"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=3999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=3999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=3999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}