Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications

    PostX, Voltage Tools Decipher Encryption

    Written by

    Michael Caton
    Published November 1, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      For companies that want to encrypt outbound e-mail without burdening recipients with client requirements, both PostX Corp.s PostX Trusted Enterprise and Voltage Security Inc.s SecureMail do a good job of providing simple-to-use solutions.

      Trusted Enterprise 5.0 and SecureMail 1.5 made it easy for recipients to receive encrypted e-mail in eWEEK Labs tests. We found that Trusted Enterprise provides better management tools and is more extensible, but its more complex than SecureMail. SecureMail integrates well with Microsoft Corp.s Outlook to simplify the step of encrypting e-mail at the senders desktop, but it needs better tools for auditing communications.

      /zimages/2/28571.gifCheck out the eWEEK Labs Executive Summaries for Trusted Enterprise 5.0 and SecureMail 1.5.

      Trusted Enterprise is priced at $35,000 for a redundant server implementation. SecureMail starts at $75,000 for 250 client licenses and an unlimited number of recipient licenses. SecureMails license scenario allows 250 internal users to generate encrypted messages that can be read by an unlimited number of external recipients through the Voltage Zero Download Messenger client.

      Both applications, which shipped in August, can encrypt e-mail messages inside the firewall and point the recipient to a Web server that delivers the encrypted message to the recipient. In addition, Trusted Enterprise can deliver an encrypted envelope that can be decrypted and viewed offline without additional client software.

      Competitors such as Liquid Machines Inc.s Email Control (formerly Omniva Policy Manager) do support policy-based encryption.

      The approach PostX takes toward secure delivery with Trusted Enterprise differs considerably from Voltages in that Trusted Enterprise works with PostXs Trusted E-Business to deliver account statements.

      This difference was evident in our tests: Trusted Enterprise includes components for encrypting and decrypting e-mail, managing keys, enrolling users and providing access to hosted mailboxes. Companies have flexible options for delivering messages to recipients in different ways.

      We tested the system with the hosted mailbox component, called WebSafe, and the enrollment system, called Enroll. Regardless of the message delivery system, Trusted Enterprise does require users to enroll or have a directory-based account.

      On the message delivery side, we deployed the system so that users would receive encrypted messages as HTML, with a signed Java applet managing the key exchange and decryption between the server and recipient. Trusted Enterprise also supports S/MIME (Secure Multipurpose Internet Mail Extension) for authentication, so trusted partners can exchange messages securely at the gateway.

      With the WebSafe server, administrators have a way to track recipients opened messages as well as failed authentication attempts. The opened e-mail message also includes a secure reply link so recipients can encrypt responses.

      Overall, the management tools give administrators good control over application components, generating reports and managing users, keys and certificates. If users forget their passwords for old envelope messages, administrators must manually recover the key through the console.

      On the reporting side, we liked the report builder within the system. It allowed us to quickly generate reports on a number of criteria—something SecureMail lacks. The one downside of the way the management console works is that administrators need to create reports; there isnt a report-only console for auditors who will need to monitor communications. This capability has been added to a forthcoming update, PostX officials said.

      /zimages/2/28571.gifClick here for eWEEK Labs tips for tackling e-mail auditing.

      SecureMail differs from Trusted Enterprise in that users send secure communications to recipients via an HTML message that authenticates the recipient against the senders Voltage Policy Server or can be read using a downloadable SecureMail reader, rather than through enrollment and using a Java applet to decrypt messages. We found Voltages Zero Download Messenger much simpler than the trusted-messaging method used by PostX, although it also operates under the assumption the user will open an HTML e-mail.

      Architecturally, Voltage takes a different approach with SecureMail. As with Trusted Enterprise, users run a plug-in for Outlook or IBMs Lotus Notes that provides the ability to encrypt a message when sending it. SecureMail differs in that two servers manage the keys and decryption process, with the Policy Suite Server managing the master key behind the firewall and the Public Parameter Server outside the firewall authenticating recipients.

      SecureMails sender features are easy to use. We could send encrypted messages directly from the Policy Server through the Web browser. Voltage also has a Windows-based IdentityManager client that allows administrators to manage identities on a client system as well as encrypt and decrypt content in the Windows clipboard.

      From an administrative standpoint, the Web-based console gives administrators good control over managing SecureMail. We could create multiple districts based on domains, and we particularly liked the tool that allowed us to easily save, back up and restore server states to a single file. This ability also makes it easy to apply settings from one district to another.

      SecureMail supports trusted districts, simplifying encrypted communications between partners as well as ensuring that communications to particular domains are always encrypted. Administrators can also configure message size to ensure that Zero Download Messenger users do not violate message-size policies.

      The biggest administrative shortcoming is in reporting. The server captures a limited amount of information, and this information is stored in a couple of log files, so administrators have to do considerable work to isolate particular events.

      /zimages/2/28571.gifCheck out eWEEK.coms Messaging & Collaboration Center at http://messaging.eweek.com for more on IM and other collaboration technologies.

      /zimages/2/77042.gif

      Be sure to add our eWEEK.com messaging and collaboration news feed to your RSS newsreader or My Yahoo page

      Michael Caton
      Michael Caton

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×