SECURE ATTACHMENT proved correspon- dents?

SECURE
ATTACHMENT
Let your staff members and partners exchange attachments while
maintaining strict confidentiality.
Regular stories of IT spying have revealed an industrialization
of electronic interceptions. It is now common knowledge that
unprotected files containing economic or political value are copied
several times when they are sent over the Internet.
With Secure attachment, you no longer have to rely on your email
infrastructure to secure your attachments because you separate
them from the exchanged messages.
REDUCE RISK
This product works with Gmail as well as the majority of email servers
used by big businesses.
ARCHIVE
AND ENCRYPT
EXCHANGES
RAISE AWARENESS
AMONG YOUR
PARTNERS
MAINTAIN CONTROL
Replace email attachments
with a secure link to the document that is to be sent.
Guarantee confidentiality for
business negotiations with
your partner to and from your
business.
Secure attachment is easy to
use with drag and drop functionality.
Share your links knowing that
they are seen only by your
business’s approved correspondents.
Ensure the identity of the
attachment receiver with a
unique password.
Automatic antivirus analysis
for each exchanged file.
Encrypt attachments on the
server with a unique password that is contained only in
the sent link.
Define your file’s duration of
availability before it self-destructs.
Secure attachment can be
deployed manually or automatically.
Archive, track and attribute
actions made using the solution.
NE W MAIL
YOU HAVE A NE W MAIL !
+ File
To [email protected]
Subject For your eyes only
FIL E1 .pdf
Cancel
/
Delete
From
[email protected]
Subject
For your eyes only
0 0 :0 1 :1 5 (1 8 %)
77.05 MB
https://down load.cor p.com
F I LE 1
PDF
77.05M B
F I LE 2
DOC
44.10M B
DOWNLOAD
S E ND
A
Type your message and click on
the lock to attach your file.
65%
source: zdnet, silicon.fr
Login
+
AT TACH LINK
LOG IN
Drag and drop your attachment
into the secure attachment window. A secure link will appear at
the end of your message.
of French
companies with
more than 1000
employees
are subject to
information theft
[email protected]
The receiver clicks and identifies
himself by filling in his email address, he will then receive a secure
link granting access to the downloading platform.
Nearly 40% of CIOs affirm that electronic surveillance programs and regulations implemented by certain countries greatly influence their
choice of service providers.
source: c|net, silicon.fr
The receiver downloads the file directly from the sender’s IT system,
he can reply with one or more files
to the initial sender by using the
link.
And if from now on
your
attachments
are only read by ap-
proved
dents?
correspon-