Tag Archives: security

Enhancements to Policy Based Encryption

A number of enhancements to Policy Based Encryption for Email Security.cloud are now available to improve the ease of use and extend the capabilities of Policy Based Encryption. These enhancements are specific to each encryption service, either PBE-E or PBE-Z.

 

Policy Based Encryption E

  • Outlook Plugin Enhancements – Encrypting from within Outlook is streamlined, and senders now have the ability to set a one-time portal password that recipients can use to pick up their messages without creating an account.
                                       
  • Attempt TLS – When enabled, PBE-E will attempt to use TLS as the first choice to securely deliver messages with no extra effort required by the sender or recipient. If TLS is not supported by the third party recipient’s mail server, push or pull encryption will be used.
     
  • Pickup Portal Enhancements – The pickup portal user interface has been improved for faster navigation, message sorting, and advanced searching. Messages can now be exported to save locally in a variety of formats.

 

Policy Based Encryption Z

  • Encryption Reporting Portal – This new portal allows administrators to view and search for messages that have been encrypted. Administrators can see how a message was encrypted, if it was successfully delivered, and when. Data can also be exported for reporting.

 

Learn more about these features by reading the attached PDF documents.

 

Security and privacy settings across your Google accounts

Google is the most popular Internet search provider worldwide. The name itself has even become a verb: We don’t look online anymore, we Google everything. Moreover, we use plenty of Google products not even realizing how connected they are. Gmail, YouTube, Translator, Google Drive, Photos (the former Picassa), Play, as well as Google+. The integration of Google […]

Security and privacy settings across your Google accounts

Google is the most popular Internet search provider worldwide. The name itself has even become a verb: We don’t look online anymore, we Google everything. Moreover, we use plenty of Google products not even realizing how connected they are. Gmail, YouTube, Translator, Google Drive, Photos (the former Picassa), Play, as well as Google+. The integration of Google […]

Security basics: Internet scams and your identity

If you’re afraid “to do something wrong” when you sit behind your computer, this new series is for you. AVAST has expertise in developing security products and we want to bring you a complete series about internet danger, with good practices to avoid scams, loss of money, and identity theft. You’re just about to join […]

Security basics: Internet scams and your identity

If you’re afraid “to do something wrong” when you sit behind your computer, this new series is for you. AVAST has expertise in developing security products and we want to bring you a complete series about internet danger, with good practices to avoid scams, loss of money, and identity theft. You’re just about to join […]

?? ???? ????(Quantified Self)? ??? ????? – ???, ????, ???? ??? ???

Self-tracking enthusiasts are generating a torrent of personal information through apps and devices. Is this data safe from prying eyes?
Read more…

How safe is your quantified self? Tracking, monitoring, and wearable tech

Self-tracking enthusiasts are generating a torrent of personal information through apps and devices. Is this data safe from prying eyes?
Read more…

O quanto seguro é o seu quantified self? Tecnologia de rastreamento, monitoramento e computação vestível

Entusiastas do automonitoramento estão gerando uma torrente de informações pessoais por meio de aplicativos e dispositivos. Esses dados e informações estão a salvo de olhares indesejados?