Appliquer automatiquement la sécurité sur les portables, les postes fixes et les serveurs...
ZedMail protects the confidentiality of data exchanged by email. Integrated in your email application, it automatically encrypts and decrypts the messages you exchange. Email access is restricted to authorized and identified recipients only. ZedMail is easy to use for regular exchanges with colleagues, clients, and partners.
The user sends their email as usual, the body of the message and any email attachments are automatically and transparently encrypted.
On reception, the email is decrypted locally and the original message is reconstructed.
Messages are encrypted and decrypted with the password or the certificate of the sender and the recipient. These secrets are consequently not handled by third party machines/software (VPN, encryption units, etc.); this ensures content can only be read by key holders (Right-to-Know).
ZedMail is integrated in the corporate email tool and has no impact on its operation. Once the user is authenticated, encryption/ decryption takes place automatically. Messages transit encrypted over the network and through the email server.
ZedMail is compatible with the push-mail features of corporate email applications: encrypted messages received on the user's mobile terminal will be decrypted locally.
To exchange encrypted messages with correspondents outside the company, Prim'X proposes its "Zed! Limited Edition" freeware. This freeware makes it possible to read encrypted messages and attachments regardless of the recipient's email application and, if required, encrypt the response.
ZedMail features a data compression function to reduce the total size of the encrypted message (message and attachments).
To encrypt emails, ZedMail uses recipient certificates, which it automatically searches for in the company's usual directories (AD, LDAP) and in the user's personal certificate stores.
When there are no certificates available for the email recipient, ZedMail automatically generates a password for that correspondent and stores it in a secure password wallet it manages for the user. The sender can therefore send emails to the recipients of their choice with no further intervention.
A recovery plan can be configured by the company. It will be automatically and systematically applied by ZedMail to enable the Security Officer to recover messages.
ZedMail installation on workstations is compatible with administered installation tools (SMS, etc.).
The security policy that applies to the email application is defined by the Security Officer via Windows Security Strategies (Policies).
The ZedMail solution is developed based on Zed! encrypted containers technology, already widely and successfully deployed by Prim'X. The Zed! product was awarded EAL3+ certification and Standard Qualification by the ANSSI (French Network and Information Security Agency).
ZedMail can function as standalone or in conjunction with all Prim'X encryption software to ensure comprehensive protection of corporate infrastructure data.
Operating system: Windows 2000, XP, 2003, Vista, 2008, Seven and Windows 8 (32bits and 64bits)
Tokens / smartcards: