Trend Micro Hosted Email Encryption manual

Trend Micro Hosted Email Encryption
7 · 1
PDF manual
 · 2 páginas
Inglés
manualTrend Micro Hosted Email Encryption
Page 1 of 2 • DATASHEET • HOSTED EMAIL ENCRYPTION
DATASHEET
Any organization with an executive management, human resources, or legal department
must exchange sensitive information over the Internet at some point or another, making
it imperative that they have a messaging security system. While encryption is a proven
method for protecting your enterprise communications, finding the right encryption
solution—particularly one without heavy administration—can be a challenge.
Trend Micro
Hosted Email Encryption integrates seamlessly with the content filtering
capabilities of Trend Micro™ Hosted Email Security. When used together, they provide
you with a comprehensive security strategy, offering policy enforcement, content
management, anti-malware, and antispam protection in a single, easy-to-manage solution.
Built with Trend Micro
PrivatePost
technology, this hosted service helps ensure availability
of encryption keys 24x7, minimizing time spent on administration. Since our policy-based
encryption automatically secures your confidential emails without end-user intervention,
your administrators will no longer need to rely on individuals to encrypt sensitive data.
Hosted Email Encryption is the easiest way for Hosted Email Security customers to
achieve compliance.

Trend Micro

HOSTED EMAIL ENCRYPTION

(included in Hosted Email Security)

Reduce your risk of non-compliance
HOSTED SERVICE
Protection Points
Messaging Gateway
In the cloud
Threat Protection
Compliance
Privacy
Data Protection
Securing Intellectual Property
KEY BENEFITS
Protects sensitive and confidential data
Enforces policies for regulatory compliance
Enables increased trust among
partners and customers
Saves time and money with hosted
deployment and key management
Simplifies use, facilitating adoption and
improving productivity
KEY FEATURES
Automatic Encryption
Appears as a content filtering rule action in Hosted Email Security—simply check a box to apply
Identifies content by attachment characteristics, keywords, lexicons, and customized data rules
Helps ensure regulatory compliance and safeguard privacy
Advanced Protocols
Encrypts both email and attachments
Decrypts via web browser for those without client software installed
Allows secure delivery to any recipient without additional hardware or software
Hosted Key Management
Accelerates deployment, lowers up-front costs, and reduces system complexity
Lifts IT burden, decreasing time spent on key management and privacy issues
Eliminates the need for pre-enrollment
Effortless Key Creation and Recovery
Creates encryption keys with just a recipient’s email address
Offers password and key recovery with no IT intervention
Ensures worldwide availability of encryption keys 24x7

Ver el manual de Trend Micro Hosted Email Encryption aquí, gratis. Este manual pertenece a la categoría licencias y extensiones de software y ha sido calificado por 1 personas con un promedio de 7 . Este manual está disponible en los siguientes idiomas: Inglés . ¿Tienes alguna pregunta sobre Trend Micro Hosted Email Encryption o necesitas ayuda? Haz tu pregunta aquí

¿Necesitas ayuda?

¿Tiene alguna consulta sobre el Trend Micro y la respuesta no está en el manual? Haga su consulta aquí. Proporcione una descripción clara y completa de su problema y su consulta. Cuanto mejor describa su problema y consulta, más fácil será para otros propietarios de Trend Micro proporcionarle una buena respuesta.

Número de preguntas: 0

General
Trend Micro
Hosted Email Encryption | EE00039503
licencias y extensión de software
Inglés
Manual de usuario (PDF)
Licencia
Tipo de licenciaGobierno (GOV)
Cantidad de licencia- licencia(s)
Tipo de softwareComplemento
Plazo de licencia15 mes(es)
Se requiere compra del nivel de licencia11 - 25 licencia(s)
Características
Versión de idiomaInglés
Requisitos del sistema
Requisitos mínimos del sistemaInternet Explorer 7.0+\nFirefox 2.2+
mostrar más

¿No puede encontrar la respuesta a su consulta en el manual? Puede encontrar la respuesta a su consulta en las preguntas frecuentes sobre el Trend Micro Hosted Email Encryption más abajo.

¿No aparece tu pregunta? Haz tu pregunta aquí

No hay resultados