StealthMail makes your emails secure and invisible to email relays, hackers, or Public Internet threats - making email relationships with clients a trusted one via StealthMail’s best-in-class Secure Email Channel.
Moreover, StealthMail gives you full and exclusive control over your encryption keys, data, and access rights - so that your email communication is fully protected.
To start using StealthMail no integration is needed. There are no risks for existing IT infrastructure. The whole deployment takes less than 4 hours. Users get Outlook Add-Ins and the server is deployed to Microsoft’s Azure Cloud.
Cloud Security
StealthMail gives exclusive control and ownership of the encryption keys and crypto-machines to our clients. Even though data may be stored in the cloud, the cloud provider has no access to the data because each Email, attachment, or file is individually encrypted on the user’s side and is kept in protected storage.
Compliance
Avoid severe penalties, protect your reputation, save time, money and effort.
Data Privacy
No one except a specified list of recipients is able to see the user’s email content.
Data Security
Any historical email or attachment, whether an employee’s or a 3rd party’s, never leaves the company’s security perimeter and is individually encrypted in protected storage.
Email Security
StealthMail uses Email to send only Stealth-Links that do not contain any user information whatsoever. Only through Stealth-Links can an authorized user access encrypted Email content and attachments. Thus, untrusted 3rd party mail servers will only receive and transfer Stealth-Links, which can't be decrypted as they do not contain data. This approach to protecting Emails makes SMTP, SSL/TLS vulnerabilities complete non-issues.
Encryption Security
StealthMail provides true end-to-end encryption, where security keys are generated and stored on the user's side. Moreover, only the user owns the keys and decides where to store his email content (on company's local servers, in the cloud, or in StealthMail storage).
Identity & Access Management
No one, except for the defined list of users, is able to see Email content from the sender. StealthMail constantly checks user identity and applies a company’s policies to executed actions. All secure data that is requested by an authorized user downloads via an end-to-end encrypted channel to protected, and encrypted temporary storage, and this is decrypted only when the user is accessing it. After the user’s authorization session ends, all temporarily stored data is erased. Furthermore, at any given time, the security officer may block user access to the information stored on the user side and even erase it.
Infrastructure Security
Critical infrastructure can be integrated on-premises or into the company’s cloud.
Penetration Testing
Protect yourself and clients from phishing (whaling, spear, clone, etc. ) and Business Email Compromise Attacks.