About

Solution

StealthMail makes company’s emails secure, legally compliant, and invisible to third parties.

StealthMail is a military-grade multi-layered business security solution that includes encryption, user-rights management, restrictions for secure data and control execution over selected operations according to your company’s security policies, and an unparalleled ability to revoke any historical Email.

StealthMail seamlessly integrates into Microsoft outlook as Add-In enhancing familiar interface with advanced security features.

Outlook

Advanced

Encryption

The solution includes true end-to-end encryption. Security keys are generated and stored on the user’s side. Moreover, only the user owns the keys and decides where to store their email content (on company’s local servers, in the cloud or in StealthMail storage).
Encryption is performed on the user’s side. That means any data the user sends is already secure, protected by advanced encryption algorithms.

KNOW

How
it Works

StealthMail uses email to send crypto-links that do not contain any user information whatsoever.

Only through the crypto-links can an authorized user access the encrypted email content and attachments.

This approach to protecting a user's emails makes the gaping vulnerabilities of SMTP, SSL / TLS complete nonissues.

Schema

Information

Protection

MailIcon

No one except for the mentioned list of users is able to see email content from the sender. StealthMail constantly checks user identity and applies a company’s policies to executed actions.

All secure data that is requested by an authorized user downloads via an end-to-end encrypted channel to protect temporary storage in an encrypted state, and is decrypted only when the user accesses it. After the user authorization session ends, all temporarily stored data is erased.

Furthermore, at any given time, the security officer may block user access to the information stored on the user side and even erase it.

Revoke

Sent emails

MailIcon

Any historical email or attachment, whether an employee’s or third party’s, never leaves the company’s secure perimeter and is individually encrypted in protected storage.

This allows a user to:

Revoke accidentally sent emails;

Revoke emails from former contractors after projects are completed;

Revoke emails from former employees, even if sent to personal email accounts.

Making

Secure Cloud
Usage

StealthMail gives exclusive control and ownership of the encryption keys and crypto-machines to our clients. Even though data may be stored in the cloud, the provider has no access to the data because each email, attachment, or file is individually encrypted on the user’s side and kept in protected storage.

Solving

The main threat of an email

Warning

StealthMail uses email to send crypto-links that do not contain any user information. Only through crypto-links can an authorized user access encrypted email content and attachments right in the user’s own email client, keeping the information safe from would be cybercriminals.

Thus, third-party email servers will only receive and transfer crypto-links, which can't be decrypted as they do not contain any user data. This approach to protecting users' emails makes SMTP, SSL/TLS vulnerabilities complete non-issues.

Solution

Icon

DATA
ENCRYPTION

Your company data is always stored and transferred in an encrypted state.

Your company data is always stored and transferred in an encrypted state.

Icon

EMAIL
ENCRYPTION

Email is used to transfer a crypto-link. The actual content is sent via secure channels in an encrypted state.

Email is used to transfer a crypto-link. The actual content is sent via secure channels in an encrypted state.

Icon

REVOKE
EMAILS

Any historical email or data, whether that of an employee or a 3rd party, can be revoked at any time.

Any historical email or data, whether that of an employee or a 3rd party, can be revoked at any time.

Icon

LEGAL
COMPLIANCE

StealthMail is flexible, so you can adjust it to meet local legal regulations.

StealthMail is flexible, so you can adjust it to meet local legal regulations.

Icon

END-USER
DEVICE
ENCRYPTION

End-to-end encryption is performed on the end user's device.

End-to-end encryption is performed on the end user's device.

Icon

ENCRYPTION
KEYS

Encryption keys are stored in your company’s secure perimeter.

Encryption keys are stored in your company’s secure perimeter.

Icon

ACCESS
HISTORY

Email sender becomes a content owner, which allows them to see who had access to their emails and when.

Email sender becomes a content owner, which allows them to see who had access to their emails and when.

Icon

BYPASSING
SMTP

Email content and files are not transferred over SMTP, which would leave them wide-open to cybercriminals.

Email content and files are not transferred over SMTP, which would leave them wide-open to cybercriminals.

Icon

RIGHTS
MANAGEMENT

No one except a specified list of recipients is able to see the user’s email content.

No one except a specified list of recipients is able to see the user’s email content.

Icon

INFRASTRUCTURE
CONTROL

Critical infrastructure can be integrated on a company’s premises or in third-party clouds.

Critical infrastructure can be integrated on a company’s premises or in third-party clouds.

Icon

INFORMATION
PROTECTION

Data stored on a user’s device is decrypted only while that user is authorized, and removed after they are not.

Data stored on a user’s device is decrypted only while that user is authorized, and removed after they are not.

Icon

PROTECTED
STORAGE

Stored emails are encrypted separately, so if a criminal were to access the stored data, it still wouldn’t be compromised.

Stored emails are encrypted separately, so if a criminal were to access the stored data, it still wouldn’t be compromised.

View

Access history

HistoryIcon

Email senders become a content owners, which allows them to see who had access to their emails and when.

Legal

Compliance

LegalIcon

StealthMail also offers optional legal protection under Swiss DPA (Data Protection Act), viewed by many as the most secure legal data protection environment in the entire world.

StealthMail acts as an escrow agent and guarantees that any other third-party will have no access to our clients' data. Clients enjoy the best of both worlds: cloud economics and absolute privacy.