January 29, 2020
Applications delivery of through the “cloud” allows companies to have a flexible (accessible from any part of the world where a stable Internet connection is) and dynamic infrastructure.
StealthMail Add-In is an enterprise-grade software solution based on the system of geographically distributed modules (that ensures stability of the whole system in general and increases fault-tolerance of other modules in particular).
A solution that ensures that all the requirements for personal data protection are met.
There are two options of StealthMail Add-In service deployment: cloud or on-premise.
If you want 24/7 physical access to your confidential data, then on-premise exactly for you.
For on-premise deployment you need to establish your own physical server, so we could install a Key Manager software on it for you to manage it to boot.
Key Manager is one of the modules from the multi-layered defensive setup of StealthMail Add-In. It is a software solution that manages key encryption.
To deploy a StealthMail server via this option you just need to do 5+1 fairly simple things:
The StealthMail solution is distributed by the SaaS (Software-as-a-Service) model.
If you choose this version of deployment, you do not need to buy, install, maintain and update any hardware or software yourself.
StealthMail Add-In deploys in a cloud of your company, so you are the one who manages the service.
After StealthMail deployment, employees of the company will be able to continue using Microsoft Outlook as their main email client, because the service is installed as a simple add-in.
To deploy StealthMail Add-In service you only need to follow 5+1 fairly simple steps:
To find out more about the additional security features of the StealthMail solution, please download the datasheet at https://StealthMail.com/en/info.
Link copied to clipboard!