Trend Micro Hosted Email Encryption manual

Trend Micro Hosted Email Encryption
  • Número de páginas: 2
  • Tipo de archivo: PDF
Any organization with an executive management, human resources, or legal department
must exchange sensitive information over the Internet at some point or another, making
it imperative that they have a messaging security system. While encryption is a proven
method for protecting your enterprise communications, finding the right encryption
solution—particularly one without heavy administration—can be a challenge.
Trend Micro
Hosted Email Encryption integrates seamlessly with the content filtering
capabilities of Trend Micro™ Hosted Email Security. When used together, they provide
you with a comprehensive security strategy, offering policy enforcement, content
management, anti-malware, and antispam protection in a single, easy-to-manage solution.
Built with Trend Micro
technology, this hosted service helps ensure availability
of encryption keys 24x7, minimizing time spent on administration. Since our policy-based
encryption automatically secures your confidential emails without end-user intervention,
your administrators will no longer need to rely on individuals to encrypt sensitive data.
Hosted Email Encryption is the easiest way for Hosted Email Security customers to
achieve compliance.

Trend Micro


(included in Hosted Email Security)

Reduce your risk of non-compliance
Protection Points
Messaging Gateway
In the cloud
Threat Protection
Data Protection
Securing Intellectual Property
Protects sensitive and confidential data
Enforces policies for regulatory compliance
Enables increased trust among
partners and customers
Saves time and money with hosted
deployment and key management
Simplifies use, facilitating adoption and
improving productivity
Automatic Encryption
Appears as a content filtering rule action in Hosted Email Security—simply check a box to apply
Identifies content by attachment characteristics, keywords, lexicons, and customized data rules
Helps ensure regulatory compliance and safeguard privacy
Advanced Protocols
Encrypts both email and attachments
Decrypts via web browser for those without client software installed
Allows secure delivery to any recipient without additional hardware or software
Hosted Key Management
Accelerates deployment, lowers up-front costs, and reduces system complexity
Lifts IT burden, decreasing time spent on key management and privacy issues
Eliminates the need for pre-enrollment
Effortless Key Creation and Recovery
Creates encryption keys with just a recipient’s email address
Offers password and key recovery with no IT intervention
Ensures worldwide availability of encryption keys 24x7
Trend Micro Hosted Email Encryption

¿Necesitas ayuda?

Número de preguntas: 0

¿Tienes alguna pregunta sobre Trend Micro Hosted Email Encryption o necesitas ayuda? Haz tu pregunta aquí. Proporciona una descripción clara y completa de tu consulta. Cuantos más detallada sea tu consulta, más fácil será para otros Trend Micro Hosted Email Encryption propietarios responder adecuadamente a tu pregunta.

Ver el manual de Trend Micro Hosted Email Encryption aquí, gratis. Este manual pertenece a la categoría Licencias y extensiones de software y ha sido calificado por 1 personas con un promedio de 7 . Este manual está disponible en los siguientes idiomas: Inglés . ¿Tienes alguna pregunta sobre Trend Micro Hosted Email Encryption o necesitas ayuda? Haz tu pregunta aquí

Trend Micro Hosted Email Encryption especificaciones

Marca Trend Micro
Modelo Hosted Email Encryption
Producto Licencias y extensión de software
Idioma Inglés
Tipo de archivo PDF
Tipo de licencia Gobierno (GOV)
Cantidad de licencia -
Tipo de software Complemento
Periodo de licencia en meses 15 month(s)
Se requiere compra del nivel de licencia 11 - 25
Versión de idioma Inglés
Requisitos del sistema
Requisitos mínimos del sistema Internet Explorer 7.0+\nFirefox 2.2+
mostrar más

Preguntas frecuentes

A continuación, encontrarás las preguntas más frecuentes sobre Trend Micro Hosted Email Encryption.

¿No aparece tu pregunta? Haz tu pregunta aquí