Secure

Solution

StealthMail makes company’s emails secure, legally compliant, and invisible to third parties, including cybercriminals and gives an exclusive control and ownership of the encryption keys and data to company clients.

Each user's Email or attached file StealthMail encrypts individually on the user’s side and stores it in the protected cloud or storage.

StealthMail seamlessly integrates into Microsoft outlook as Add-In enhancing familiar interface with advanced security features.

Outlook
DATA <br /> ENCRYPTION

DATA
ENCRYPTION

Your company data is always stored and transferred in an encrypted state.

EMAIL <br /> ENCRYPTION

EMAIL
ENCRYPTION

Email is used to transfer a crypto-link. The actual content is sent via secure channels in an encrypted state.

REVOKE <br /> EMAILS

REVOKE
EMAILS

Any historical email or data, whether that of an employee or a 3rd party, can be revoked at any time.

LEGAL <br /> COMPLIANCE

LEGAL
COMPLIANCE

StealthMail is flexible, so you can adjust it to meet local legal regulations.

Threat

Major email
Threats

Email vulnerabilities

91% of intrusions are committed via email, making it one of the most weakest links in the security.

No real encryption

Most other email security solutions offer no more than basic session encryption such as HTTPS, SSL / TLS.

Job loss risk

Cyber attacks, data breaches and leaks forced top executives to end their careers.

Network threats

All emails transferred via ISP, hotels, airports, and coffee shops can easily be intercepted and used.

Legal compliance

Not all security solutions comply with your local laws, and regulations may become a legal challenge

Unsecure clouds

Cloud services do not provide information on where user's data is actually stored and who else can access it.

SMTP Weaknesses

SMTP protocol prescribes to send emails in plain text, which makes it extremely easy for criminals to intercept.

Human Error

Employees errors, intended or not, create nearly unlimited risks of data breaches.

Security Keys Ownership

Without encryption keys, service providers have complete access to all of their clients' sensitive information.

GDPR Challenges

New regulations may cause significant challenges and potential threats.

Uncovering Email

Vulnerabilities

Emails are vulnerable. No large corporation, small business, or politician can guarantee that their emails are safe.

91% of intrusions are committed via email, which should come as no surprise given the fact that they carry some gaping weaknesses which leave them vulnerable to malicious parties.

Emails are sent and received according to SMTP (Simple Mail Transfer Protocol), so they are not secure by design. This protocol prescribes that users send email content and attachments in plain text over the public Internet.

That means that the content in unsecure emails, regardless of the information they contain, can be easily read by anyone who tries to intercept it.

Threat

Man-in-the-middle attack

“SMTP servers and clients normally communicate in the clear text over the Internet. In many cases, this communication goes through one or more routers that are not controlled or trusted by either entity.”

Schema

Frightening

51 %

of employees believe safeguarding corporate information is not their responsibility

"

Symantec: The Silver Lining – Protecting Corporate Information in the Cloud

"

Symantec: The Silver Lining – Protecting Corporate Information in the Cloud

91 %

of worldwide cyberattacks start with a phishing email.

58 %

of workers admit to have accidentally sent sensitive information to the wrong person

"

HIPPA Secure Now, “A look at the cost of healthcare data breaches,” Art Gross, March 30, 2012

"

HIPPA Secure Now, “A look at the cost of healthcare data breaches,” Art Gross, March 30, 2012

16 %

of businesses are fully prepared to handle mobility security challenges

"

Techaisle 2015 SMB Mobility Adoption Trends Study

"

Techaisle 2015 SMB Mobility Adoption Trends Study

KNOW

How
it Works

StealthMail uses email to send crypto-links that do not contain any user information whatsoever.

Only through the crypto-links can an authorized user access the encrypted email content and attachments.

This approach to protecting a user's emails makes the gaping vulnerabilities of SMTP, SSL / TLS complete nonissues.

Schema

Security

News

Information

Solution

StealthMail makes company’s emails secure, legally compliant, and invisible to third parties, including cybercriminals.

StealthMail is a military-grade multi-layered business security solution that includes encryption, user-rights management, restrictions for secure data, execution control over selected operations according to your company’s security policies, and an unparalleled ability to revoke any historical emails.

Technical

Details

StealthMail provides true end-to-end encryption, where security keys are generated and stored on the user's side.

Moreover, only the user owns the keys and decides where to store their email content (on company's local servers, in the cloud, or in StealthMail storage).

Encryption keys

ECC 512+

bit elliptic curve

Data transfer

TWOFISH 256

bit

Messaging

512

bit HMAC key

Signature and Auth

RSA 8182

bit

Data storage

AES 256

bit

Passwords hash

SHA-3 512

bit

Map

Contact us