Trend Micro Hosted Email Encryption, Add, GOV, 6-10u, 08m User Manual
Displayed below is the user manual for Hosted Email Encryption, Add, GOV, 6-10u, 08m by Trend Micro which is a product in the Software Licenses/Upgrades category. This manual has pages.
Related Manuals
Page 1 of 2 • DATASHEET • HOSTED EMAIL ENCRYPTION
DATASHEET
Any organization with an executive management, human resources, or legal department
must exchange sensitive information over the Internet at some point or another, making
it imperative that they have a messaging security system. While encryption is a proven
method for protecting your enterprise communications, finding the right encryption
solution—particularly one without heavy administration—can be a challenge.
Trend Micro™ Hosted Email Encryption integrates seamlessly with the content filtering
capabilities of Trend Micro™ Hosted Email Security. When used together, they provide
you with a comprehensive security strategy, offering policy enforcement, content
management, anti-malware, and antispam protection in a single, easy-to-manage solution.
Built with Trend Micro™ PrivatePost™ technology, this hosted service helps ensure availability
of encryption keys 24x7, minimizing time spent on administration. Since our policy-based
encryption automatically secures your confidential emails without end-user intervention,
your administrators will no longer need to rely on individuals to encrypt sensitive data.
Hosted Email Encryption is the easiest way for Hosted Email Security customers to
achieve compliance.
Trend Micro™
HOSTED EMAIL ENCRYPTION
(included in Hosted Email Security)
Reduce your risk of non-compliance
HOSTED SERVICE
Protection Points
•Messaging Gateway
•In the cloud
Threat Protection
•Compliance
•Privacy
•Data Protection
•Securing Intellectual Property
KEY BENEFITS
•Protects sensitive and confidential data
•Enforces policies for regulatory compliance
•Enables increased trust among
partners and customers
•Saves time and money with hosted
deployment and key management
•Simplifies use, facilitating adoption and
improving productivity
KEY FEATURES
Automatic Encryption
•Appears as a content filtering rule action in Hosted Email Security—simply check a box to apply
•Identifies content by attachment characteristics, keywords, lexicons, and customized data rules
•Helps ensure regulatory compliance and safeguard privacy
Advanced Protocols
•Encrypts both email and attachments
•Decrypts via web browser for those without client software installed
•Allows secure delivery to any recipient without additional hardware or software
Hosted Key Management
•Accelerates deployment, lowers up-front costs, and reduces system complexity
•Lifts IT burden, decreasing time spent on key management and privacy issues
•Eliminates the need for pre-enrollment
Effortless Key Creation and Recovery
•Creates encryption keys with just a recipient’s email address
•Offers password and key recovery with no IT intervention
•Ensures worldwide availability of encryption keys 24x7
Page 2 of 2 • DATASHEET • HOSTED EMAIL ENCRYPTION
©2015 by Trend Micro Incorporated. All rights reserved. Trend Micro, the
Trend Micro t-ball logo, InterScan, and Worry-Free are trademarks or
registered trademarks of Trend Micro Incorporated. All other company
and/or product names may be trademarks or registered trademarks of
their owners. Information contained in this document is subject to change
without notice. [DS04_TMHEE_150123US]
Securing Your Journey to the Cloud
EXAMPLE CONFIGURATION
Hosted Email Encryption uses Trend Micro Hosted Email Security content filtering rules and
hosted key management to easily and automatically deliver email data protection.
SERVICE REQUIREMENTS
Must use Hosted Email Security with outbound content filtering.
No additional hardware or software is required.
SYSTEM REQUIREMENTS FOR HOSTED EMAIL SECURITY
Hosted Email Security does not require email security hardware or software. All scanning
hardware and software is located offsite at Trend Micro’s secure network operating centers.
A personal computer with Internet access is required to use the web-based Hosted Email Security
administrative console. Encryption is applied through this console.
COMPATIBLE WEB BROWSERS
•Microsoft™ Internet Explorer 7.0 or later
•Mozilla™ Firefox™ 2.2 or later
Recipient Experience: Encrypted email is received in a sealed envelope. Recipients can download
their own copy of Trend Micro™ Encryption for Email Client or use the web-based Zero Download
Reader to read and reply without the need to install any software on desktops or smartphones.
Hosted Email
Encryption In-the-cloud
Key Management
Transport
Layer Security
Trend Micro Hosted Email Encryption
seamlessly integrates with the content
filtering capabilities of Hosted Email
Security. This hosted service provides:
•Antispam
•Antivirus
•Antispyware
•Antiphishing
•Content Filtering
RELATED PRODUCTS
•Trend Micro™ Encryption
for Email Client
Plugs into Microsoft® Outlook®,
efficiently securing email
to any recipient
•Worry-Free™ Advanced
Hosted Email Security is included in
Worry-Free Advanced
•Smart Protection Complete
Hosted Email Security is included in
Smart Protection Complete bundle