Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Secure E-Mail Gaining

    Written by

    eWEEK EDITORS
    Published October 29, 2001
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      As fears spread about anthrax-contaminated paper mail, secure e-mail is finally arriving.

      The technology to make e-mail encryption a reality for businesses has often been criticized for being too difficult to implement, manage and teach to employees.

      But the dream of secure e-mail is more alive today than ever, as technology emerges that takes the difficulty out of encryption, and the complexity out of the hands of the user.

      “Its a prime time, in that youre getting regular press attention,” said Ken Beers, product line manager of Tumbleweed Communications, which provides tools for secure e-mail content distribution. “Everybodys talking about it and everybodys asking about it. And what weve seen is people beginning to understand it and the premise of it and start to go down that path.”

      A recent Meta Group report stated that 47 percent of security departments surveyed planned to implement e-mail encryption within the year.

      The facilitator of encrypted e-mail has also been its problem: public key infrastructure. It is considered a highly secure architecture for exchanging encrypted documents – utilizing two security keys, one public and one private. Baltimore Technologies, Entrust, RSA Security and VeriSign are PKIs biggest supporters.

      But PKI is considered too difficult to implement on a wide scale, and too hard for most people in a business to use, because they have to encrypt each message.

      New software available on the market today, however, takes the complexity out of encrypted e-mail, while maintaining most of the security. One of these solutions, Tumbleweeds Secure Mail, uses PKI, but requires only one key because it protects inbound and outbound messages at the enterprise gateway and not at the desktop.

      Before using Secure Mail, I-managers can set the system up to automatically encrypt messages between particular individuals, departments or partners outside the network perimeter. For example, a company would most likely want to encrypt communications with its law firm.

      Beers equates gateway-to-gateway encryption for e-mail with the way Secure Sockets Layer encryption has been used for years on the Web, encoding communications without the user ever even needing to know, let alone activate anything. “Whats really needed in the e-mail space is that same ease of use the Web has had for years,” Beers said.

      Bulk Messages

      Caelen King, product marketing manager of Baltimore Technologies, said while PKI is difficult to implement for desktop-to-desktop secure e-mail, it shouldnt necessarily be avoided for all business uses. “Gateway-to-gateway encryption wouldnt be acceptable in merger and acquisition cases,” King said. “But if you want to bulk encrypted messages, gateway-to-gateway is perfectly feasible.”

      Sigaba, another e-mail security company, takes a slightly different approach, scrambling the message from desktop to desktop so that even the e-mail gateway doesnt have an unencrypted copy. The solution appends the e-mail message with an encrypted HTML attachment and the recipient needs a password to open it.

      Another resolution in the industry has been the overwhelming support for Secure Multipurpose Internet Mail Extensions (MIME) as a standard for sending encrypted mail over Pretty Good Privacy. The major e-mail platforms from IBMs Lotus Development, Microsoft and Netscape have adopted S/MIME.

      The government has supported the use of encryption between businesses to secure online commerce transactions. Recent laws requiring financial institutions and health care companies to secure communications have driven wider-scale use of e-mail encryption, King noted.

      “From a business perspective, the government views [e-mail encryption] as essential for real electronic commerce to take place, for secure communications as a super set of secure e-mail,” he said.

      Robert Cook, CEO and chairman of Sigaba, said up until now, I-managers have been faced with unsympathetic senior-level executives on the topic of secure e-mail.

      “Theres a disconnect between the CEO that thinks theres no problem, and the IT guy who cant budget for it,” Cook said.

      With talk of cyberterrorism and the anthrax scare in the news, that disconnect has been resolved.

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×