[section bgcolor=”#ffffff” padding=”40px 0 40px 0″]
Protected Trust Makes Secure Email Simple
Easy to Send and Receive Secure Emails
- Email recipients do not need to register to access the secured email
- A variety of identity authentication options are available to establish the recipient’s identity, including a shared password or phone verification
- Multiple applications to access your secure email: Microsoft Outlook® plug-in, web interface (no email client required) or even the native iOS application for an iPhone or iPad. Protected Trust is optimized for all mobile devices
- Almost no training is necessary for the sender, nor is an appliance installation required
Recipient Verification Methods
With regular email one can send a message claiming to be whomever he or she wants. Just because a message says it’s from Mr. Smith, doesn’t mean that he actually composed the message. He may have no idea that someone is forging his name and address. But with Protected Trust secure email encryption every user must prove his or her identity when sending or opening a protected message. We offer the following Recipient Verification methods:
- User’s Credentials: Once a recipient is registered at Protected Trust his or her identity was already verified by our Servers
- Phone Verification: Protected Trust workflow avoids the hassle of registering recipients with an easy to use feature as familiar as one’s own cell phone
- Shared Secret: Common phrase or number combinations already establish between the sender and recipient, such: last four digits of recipient’s Social Security, Customer’s numbers and more…
Delivery Insight Provides Peace of Mind
Audit trails can be used as a support for regular system operations and also as a kind of insurance policy. As insurance, audit trails are maintained but are not used unless needed, such as if there are suspected problems or external requests for information. As a support for operations, audit trails are used to help system administrators ensure that the system or resources have not been harmed by hackers, insiders, or technical problems. Protected Trust clients have just such a trail available to them on demand, in real time. Clients can know who, when, and where every action is performed on each protected message through the ever-available proof-of-delivery log. Besides that, if clients are audited (for internal or external compliance, or say by a court action) they can prove the whole electronic message’s life span. If an auditor asks about what happened with a specific message the client can prove the actions using the proof-of-delivery log. Further, because of the integrated nature of the log (e.g. it’s virtually tamper-proof) it is admissible in court.
Take Control of Your Secure Messages
Protected Trust offers several ways to further control the content and delivery of your message:
- Recipient notification is a straightforward feature that allows the sender to be notified when the protected message is received and opened. This can be handy to avoid a recipient claiming they never received or saw your email message.
- Revoke an email message at any time prior to being opened by the intended recipient. Ever wish you could take back an email or just reword it? This feature can be invaluable.
- Message an expiration date gives the sender the control to specify a life span for the delivery and opening of a message, that reducing risk the message would somehow be viewed by an unintended recipient, or even viewed by the intended recipient past a critical deadline.