Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications

    PostX, Voltage Tools Decipher Encryption

    By
    Michael Caton
    -
    November 1, 2004
    Share
    Facebook
    Twitter
    Linkedin

      For companies that want to encrypt outbound e-mail without burdening recipients with client requirements, both PostX Corp.s PostX Trusted Enterprise and Voltage Security Inc.s SecureMail do a good job of providing simple-to-use solutions.

      Trusted Enterprise 5.0 and SecureMail 1.5 made it easy for recipients to receive encrypted e-mail in eWEEK Labs tests. We found that Trusted Enterprise provides better management tools and is more extensible, but its more complex than SecureMail. SecureMail integrates well with Microsoft Corp.s Outlook to simplify the step of encrypting e-mail at the senders desktop, but it needs better tools for auditing communications.

      /zimages/2/28571.gifCheck out the eWEEK Labs Executive Summaries for Trusted Enterprise 5.0 and SecureMail 1.5.

      Trusted Enterprise is priced at $35,000 for a redundant server implementation. SecureMail starts at $75,000 for 250 client licenses and an unlimited number of recipient licenses. SecureMails license scenario allows 250 internal users to generate encrypted messages that can be read by an unlimited number of external recipients through the Voltage Zero Download Messenger client.

      Both applications, which shipped in August, can encrypt e-mail messages inside the firewall and point the recipient to a Web server that delivers the encrypted message to the recipient. In addition, Trusted Enterprise can deliver an encrypted envelope that can be decrypted and viewed offline without additional client software.

      Competitors such as Liquid Machines Inc.s Email Control (formerly Omniva Policy Manager) do support policy-based encryption.

      The approach PostX takes toward secure delivery with Trusted Enterprise differs considerably from Voltages in that Trusted Enterprise works with PostXs Trusted E-Business to deliver account statements.

      This difference was evident in our tests: Trusted Enterprise includes components for encrypting and decrypting e-mail, managing keys, enrolling users and providing access to hosted mailboxes. Companies have flexible options for delivering messages to recipients in different ways.

      We tested the system with the hosted mailbox component, called WebSafe, and the enrollment system, called Enroll. Regardless of the message delivery system, Trusted Enterprise does require users to enroll or have a directory-based account.

      On the message delivery side, we deployed the system so that users would receive encrypted messages as HTML, with a signed Java applet managing the key exchange and decryption between the server and recipient. Trusted Enterprise also supports S/MIME (Secure Multipurpose Internet Mail Extension) for authentication, so trusted partners can exchange messages securely at the gateway.

      With the WebSafe server, administrators have a way to track recipients opened messages as well as failed authentication attempts. The opened e-mail message also includes a secure reply link so recipients can encrypt responses.

      Overall, the management tools give administrators good control over application components, generating reports and managing users, keys and certificates. If users forget their passwords for old envelope messages, administrators must manually recover the key through the console.

      On the reporting side, we liked the report builder within the system. It allowed us to quickly generate reports on a number of criteria—something SecureMail lacks. The one downside of the way the management console works is that administrators need to create reports; there isnt a report-only console for auditors who will need to monitor communications. This capability has been added to a forthcoming update, PostX officials said.

      /zimages/2/28571.gifClick here for eWEEK Labs tips for tackling e-mail auditing.

      SecureMail differs from Trusted Enterprise in that users send secure communications to recipients via an HTML message that authenticates the recipient against the senders Voltage Policy Server or can be read using a downloadable SecureMail reader, rather than through enrollment and using a Java applet to decrypt messages. We found Voltages Zero Download Messenger much simpler than the trusted-messaging method used by PostX, although it also operates under the assumption the user will open an HTML e-mail.

      Architecturally, Voltage takes a different approach with SecureMail. As with Trusted Enterprise, users run a plug-in for Outlook or IBMs Lotus Notes that provides the ability to encrypt a message when sending it. SecureMail differs in that two servers manage the keys and decryption process, with the Policy Suite Server managing the master key behind the firewall and the Public Parameter Server outside the firewall authenticating recipients.

      SecureMails sender features are easy to use. We could send encrypted messages directly from the Policy Server through the Web browser. Voltage also has a Windows-based IdentityManager client that allows administrators to manage identities on a client system as well as encrypt and decrypt content in the Windows clipboard.

      From an administrative standpoint, the Web-based console gives administrators good control over managing SecureMail. We could create multiple districts based on domains, and we particularly liked the tool that allowed us to easily save, back up and restore server states to a single file. This ability also makes it easy to apply settings from one district to another.

      SecureMail supports trusted districts, simplifying encrypted communications between partners as well as ensuring that communications to particular domains are always encrypted. Administrators can also configure message size to ensure that Zero Download Messenger users do not violate message-size policies.

      The biggest administrative shortcoming is in reporting. The server captures a limited amount of information, and this information is stored in a couple of log files, so administrators have to do considerable work to isolate particular events.

      /zimages/2/28571.gifCheck out eWEEK.coms Messaging & Collaboration Center at http://messaging.eweek.com for more on IM and other collaboration technologies.

      /zimages/2/77042.gif

      Be sure to add our eWEEK.com messaging and collaboration news feed to your RSS newsreader or My Yahoo page

      Michael Caton

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×