Trend Micro Hosted Email Encryption manual

Trend Micro Hosted Email Encryption
7 · 1
PDF manual
 · 2 paginas
Inglés
manualTrend Micro Hosted Email Encryption
Page 1 of 2 • DATASHEET • HOSTED EMAIL ENCRYPTION
DATASHEET
Any organization with an executive management, human resources, or legal department
must exchange sensitive information over the Internet at some point or another, making
it imperative that they have a messaging security system. While encryption is a proven
method for protecting your enterprise communications, finding the right encryption
solution—particularly one without heavy administration—can be a challenge.
Trend Micro
Hosted Email Encryption integrates seamlessly with the content filtering
capabilities of Trend Micro™ Hosted Email Security. When used together, they provide
you with a comprehensive security strategy, offering policy enforcement, content
management, anti-malware, and antispam protection in a single, easy-to-manage solution.
Built with Trend Micro
PrivatePost
technology, this hosted service helps ensure availability
of encryption keys 24x7, minimizing time spent on administration. Since our policy-based
encryption automatically secures your confidential emails without end-user intervention,
your administrators will no longer need to rely on individuals to encrypt sensitive data.
Hosted Email Encryption is the easiest way for Hosted Email Security customers to
achieve compliance.

Trend Micro

HOSTED EMAIL ENCRYPTION

(included in Hosted Email Security)

Reduce your risk of non-compliance
HOSTED SERVICE
Protection Points
Messaging Gateway
In the cloud
Threat Protection
Compliance
Privacy
Data Protection
Securing Intellectual Property
KEY BENEFITS
Protects sensitive and confidential data
Enforces policies for regulatory compliance
Enables increased trust among
partners and customers
Saves time and money with hosted
deployment and key management
Simplifies use, facilitating adoption and
improving productivity
KEY FEATURES
Automatic Encryption
Appears as a content filtering rule action in Hosted Email Security—simply check a box to apply
Identifies content by attachment characteristics, keywords, lexicons, and customized data rules
Helps ensure regulatory compliance and safeguard privacy
Advanced Protocols
Encrypts both email and attachments
Decrypts via web browser for those without client software installed
Allows secure delivery to any recipient without additional hardware or software
Hosted Key Management
Accelerates deployment, lowers up-front costs, and reduces system complexity
Lifts IT burden, decreasing time spent on key management and privacy issues
Eliminates the need for pre-enrollment
Effortless Key Creation and Recovery
Creates encryption keys with just a recipient’s email address
Offers password and key recovery with no IT intervention
Ensures worldwide availability of encryption keys 24x7

Vea el manual de Trend Micro Hosted Email Encryption aquí, de forma gratuita. Este manual pertenece a la categoría Licencias y Expansión de software y ha sido calificado por 1 personas con un promedio de 7. Este manual está disponible en los siguientes idiomas: Inglés. ¿Tiene alguna pregunta sobre Trend Micro Hosted Email Encryption o necesita ayuda? Haz tu pregunta aquí

¿Necesita ayuda?

¿Tienes alguna pregunta sobre el Trend Micro y no encuentras la respuesta en el manual? Haz tu pregunta aquí. Describe de forma clara y completa tu problema y haz tu pregunta. Cuanto mejor expliques el problema y formules tu pregunta, más fácil será para otros propietarios de dispositivos Trend Micro proporcionarte una respuesta útil.

Número de preguntas: 0

General
Trend Micro
Hosted Email Encryption | EE00039503
Licencia y Expansión de Software
Inglés
Manual de usuario (PDF)
Licencia
Tipo de licenciaGobierno (GOV)
Cantidad de licencia- licencia(s)
Tipo de softwareComplemento
Plazo de licencia15 mes(es)
Se requiere compra del nivel de licencia11 - 25 licencia(s)
Características
Versión de idiomaInglés
Requisitos del sistema
Requisitos mínimos del sistemaInternet Explorer 7.0+\nFirefox 2.2+
mostrar más

¿No encuentras la respuesta a tu pregunta en el manual? Puede que encuentres lo que buscas en la sección de preguntas frecuentes sobre el Trend Micro Hosted Email Encryption más abajo.

¿Tu pregunta no está en la lista? Haz tu pregunta aquí

No hay resultados